Stella Ops Security Policy & Responsible Disclosure

Version 3 · 2025‑07‑15


0 · Supported versions 🗓️

Release lineStatusSecurity fix window
v0.1 α (late 2025)Upcoming90 days after GA of v0.2
v0.2 β (Q1 2026)Planned6 months after GA of v0.3
v0.3 β (Q2 2026)Planned6 months after GA of v0.4
v0.4 RC (Q3 2026)PlannedUntil v1.0 GA
v1.0 GA (Q4 2026)Future LTS24 months from release

Pre‑GA lines receive critical and high‑severity fixes only.


1 · How to report a vulnerability 🔒

ChannelPGP‑encrypted?Target SLA
security@stella-ops.orgYes – PGP key: /keys/#pgp72 h acknowledgement
Matrix DM → @sec‑bot:libera.chatOptional72 h acknowledgement
Public issue with label securityNo (for non‑confidential flaws)7 d acknowledgement

Please include:

  • Affected version(s) and environment
  • Reproduction steps or PoC
  • Impact assessment (data exposure, RCE, DoS, etc.)
  • Preferred disclosure timeline / CVE request info

2 · Our disclosure process 📜

  1. Triage – confirm the issue, assess severity, assign CVSS v4 score.
  2. Patch development – branch created in a private mirror; PoCs kept confidential.
  3. Pre‑notification – downstream packagers & large adopters alerted 72 h before release.
  4. Co‑ordinated release – patched version + advisory (GHSA + CVE) + SBOM delta.
  5. Credits – researchers listed in release notes (opt‑in).

We aim for 30 days from report to release for critical/high issues; medium/low may wait for the next scheduled release.


3 · Existing safeguards ✅

LayerControl
Release integritycosign signatures + SPDX SBOM on every artefact
Build pipelineReproducible, fully declarative CI; SBOM diff verified in CI
Runtime hardeningNon‑root UID, distroless‑glibc base, SELinux/AppArmor profiles, cgroup CPU/RAM caps
Access logsRetained 7 days, then sha256(ip) hash
Quota ledgerStores token‑ID hash only, no plain e‑mail/IP
Air‑gap supportSigned Offline Update Kit (OUK) validated before import
Secure defaultsTLS 1.3 (or stronger via plug‑in), HTTP Strict‑Transport‑Security, Content‑Security‑Policy
SBOM re‑scanNightly cron re‑checks previously “clean” images against fresh CVE feeds

4 · Cryptographic keys 🔑

PurposeFingerprintWhere to fetch
PGP (sec‑team)3A5C ​71F3 ​... ​7D9B/keys/#pgp
Cosign release keyAB12 ... EF90/keys/#cosign

Verify all downloads (TLS 1.3 by default; 1.2 allowed only via a custom TLS provider such as GOST):

cosign verify \
  --key https://stella-ops.org/keys/cosign.pub \
  registry.stella-ops.org/stella-ops/stella-ops:<VERSION>

5 · Private‑feed mirrors 🌐

The Concelier (vulnerability ingest/merge/export service) provides signed JSON and Trivy DB snapshots that merge:

  • OSV + GHSA
  • (optional) NVD 2.0, CNNVD, CNVD, ENISA, JVN and BDU regionals

The snapshot ships in every Offline Update Kit and is validated with an in‑toto SLSA attestation at import time.


6 · Hall of Thanks 🏆

We are grateful to the researchers who help keep Stella Ops safe:

ReleaseResearcherHandle / Org
empty(your name here)