Skip to content

Security: peterstone649/md

SECURITY.md

Security Policy

Supported Versions

We take security seriously and actively maintain security updates for the following versions of our framework components:

Version Supported Security Updates Bug Fixes
1.2.x
1.1.x
1.0.x
< 1.0

Framework Components

  • MODEL_for_framework: Core framework (ACTIVE status) - Full security support
  • MODEL_for_STKHLD_AI_COLLAB: Stakeholder collaboration model (DRAFT status) - Limited support

Reporting a Vulnerability

We appreciate your help in keeping our AI frameworks and methodologies secure. If you discover a security vulnerability, please follow these steps:

How to Report

  1. Email: Send security reports to ( peter stone mail de )

    • Use the subject line: [SECURITY] Vulnerability Report - [Component Name]
    • Include detailed steps to reproduce the issue
    • Provide your contact information for follow-up
  2. GitHub Security Advisories: For public repositories, you can also use GitHub Security Advisories

What to Include in Your Report

Please provide as much detail as possible:

  • Description: Clear description of the vulnerability
  • Impact: Potential impact on users, data, or systems
  • Steps to Reproduce: Detailed reproduction steps
  • Affected Components: Which parts of the framework are affected
  • Environment: Your setup (OS, Python version, etc.)
  • Proof of Concept: If available, include PoC code or screenshots

Response Timeline

  • Initial Response: Within 48 hours of receiving your report
  • Vulnerability Assessment: Within 7 days
  • Fix Development: Within 30 days for critical vulnerabilities
  • Public Disclosure: Coordinated disclosure after fix is deployed

Vulnerability Classification

We classify vulnerabilities using the following severity levels:

  • Critical: Immediate threat to user data or system integrity
  • High: Significant security risk with potential for exploitation
  • Medium: Security weakness with limited exploitation potential
  • Low: Minor security improvements needed

Recognition

We recognize and appreciate security researchers who help improve our frameworks. With your permission, we'll acknowledge your contribution in our security acknowledgments.

Safe Harbor

We consider security research conducted in accordance with this policy to be authorized. We will not initiate legal action against researchers who follow these guidelines.

Contact Information

Thank you for helping keep our AI frameworks secure!

There aren’t any published security advisories