| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in Symbiont, please report it responsibly:
- Do NOT open a public GitHub issue for security vulnerabilities
- Email security concerns to: [[email protected]] (replace with actual contact)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Fix Timeline: Depends on severity
- Critical: 24-72 hours
- High: 1 week
- Medium: 2-4 weeks
- Low: Next release
Symbiont uses:
- Ed25519 for digital signatures (via
ed25519-dalek) - BLAKE3 for cryptographic hashing
The protocol assumes:
- Node IDs are cryptographically bound to key pairs
- Signatures are verified before processing messages
- Network transport provides basic integrity (TLS/encryption at transport layer)
- Sybil Resistance: Requires external identity binding (e.g., stake, social graph)
- Eclipse Attacks: Nodes should maintain diverse connections
- Timing Attacks: Not currently hardened against timing side-channels
When deploying Symbiont:
-
Key Management
- Store private keys securely
- Rotate keys periodically
- Use hardware security modules in production
-
Network Security
- Use TLS for all network communications
- Implement rate limiting
- Monitor for anomalous patterns
-
Operational Security
- Keep dependencies updated
- Run
cargo auditregularly - Enable logging and monitoring
We recommend running:
# Install cargo-audit
cargo install cargo-audit
# Run audit
cargo audit
# Install cargo-deny
cargo install cargo-deny
# Check for issues
cargo deny checkSecurity updates will be announced via:
- GitHub Security Advisories
- Release notes
- [Mailing list if applicable]