If you discover a security vulnerability in COVENANT.DATA, please report it privately.
Do not open a public issue.
Send email to: security@covenant.data
Please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if known)
We will acknowledge receipt within 48 hours and provide a response within 7 days.
- Users will be notified of security issues
- Fixed versions will be released promptly
- Credit will be given to reporters
- Details will be published after fix is available
Security updates are provided for:
- Latest minor version (0.1.x)
COVENANT.DATA assumes:
- Insider misuse is possible
- Accidental export of sensitive fields
- Stolen laptops/devices
- Hostile plugins or connectors
- Malicious data attempting to break parsers
- Deny by default
- Explicit purpose required for access
- Strong separation between raw and exported data
- Encryption support for bundles and local stores
- Strict input validation for every parser
- Safe defaults that block common failure modes
See docs/THREAT_MODEL.md for detailed threat modeling.