We actively support the following versions with security updates:
| Version | Supported | End of Life |
|---|---|---|
| 2.0.x | ✅ | TBD |
| 1.0.x | ❌ | 2025-11-22 |
DO NOT report security vulnerabilities through public GitHub issues.
We follow a 90-day coordinated disclosure policy. Please report security vulnerabilities to:
Primary Contact: security@kaldor.community
PGP Key: See .well-known/security.txt
Response Time: Within 48 hours
Please include the following information:
- Type of vulnerability (e.g., RCE, XSS, authentication bypass)
- Affected component (firmware, backend, frontend, etc.)
- Impact assessment (CVSS score if available)
- Reproduction steps (detailed, step-by-step)
- Proof of concept (code, screenshots, video)
- Suggested fix (optional but appreciated)
- Day 0: Vulnerability report received
- Day 1-2: Acknowledgment sent to reporter
- Day 3-14: Vulnerability verified and severity assessed
- Day 15-60: Fix developed and tested
- Day 61-75: Security advisory drafted
- Day 76-90: Coordinated public disclosure
- CVE assigned (if applicable)
- Security advisory published
- Credit given to reporter (unless anonymity requested)
In Scope:
- Authentication bypass
- Authorization issues
- Remote code execution (RCE)
- SQL injection, XSS, CSRF
- Firmware vulnerabilities
- MQTT/Matter protocol attacks
- OPC UA security issues
- CRDT convergence failures
- Memory safety violations
- Cryptographic vulnerabilities
Out of Scope:
- Social engineering attacks
- Physical attacks on hardware
- Denial of Service (DoS) - unless amplification factor >100x
- Issues in third-party dependencies (report to upstream)
- Issues requiring physical access to devices
- Theoretical vulnerabilities without proof of concept
The Kaldor platform implements multiple security layers:
-
Network Layer
- TLS 1.3 for all connections
- Matter protocol encryption
- Thread mesh network security
- mTLS for MQTT
-
Application Layer
- JWT-based authentication
- Role-based access control (RBAC)
- Input validation (Zod schemas)
- Rate limiting
- CSRF protection
-
Data Layer
- Encryption at rest (AES-256-GCM)
- PostgreSQL row-level security
- Encrypted backups
- CRDT signed operations
-
Firmware Layer
- Secure boot (ESP32-C6)
- OTA signature verification
- WASM sandboxing
- Memory protection (RISC-V PMP)
See docs/security/THREAT_MODEL.md for detailed threat analysis.
Key Threats Addressed:
- Unauthorized machine control
- Production data tampering
- Community governance manipulation
- Supply chain attacks
- Insider threats (TPCF perimeters)
- Change all default passwords
- Generate unique JWT secret (min 32 bytes)
- Enable HTTPS with valid certificates
- Configure firewall rules (allow-list only)
- Enable audit logging
- Set up intrusion detection (fail2ban)
- Implement backup encryption
- Configure RBAC policies
- Enable signed commits requirement
- Run dependency scanner (weekly)
- Perform security audit (annually)
- Flash firmware with secure boot enabled
- Set unique device certificates
- Disable debug interfaces in production
- Enable Matter commissioner authentication
- Configure OTA signature verification
- Set up device attestation
- Implement certificate rotation (90 days)
We use the following tools for security assurance:
- SAST: Deno's built-in linter, Rust Clippy
- Dependency Scanning: Dependabot,
deno outdated - Secrets Detection: GitGuardian, gitleaks
- Container Scanning: Trivy, Docker Scout
- Fuzzing: AFL++ for C/C++ firmware
- Penetration Testing: Annual third-party audit
Current known vulnerabilities are tracked at: https://github.com/Hyperpolymath/Kaldor-IIoT/security/advisories
- Email: security@kaldor.community
- PGP Key Fingerprint: See
.well-known/security.txt - Security Advisory Feed: RSS available at
/security/advisories.rss
We do not currently offer a bug bounty program, but we:
- Publicly acknowledge security researchers (with permission)
- Prioritize security fixes above all other work
- Provide CVE credit where applicable
- Are exploring community-funded bounty options
This security policy aligns with:
- OWASP Top 10 (2021)
- CWE Top 25 (2024)
- NIST Cybersecurity Framework
- IEC 62443 (Industrial cybersecurity)
- RFC 9116 (security.txt)
This policy was last updated: 2025-11-22
Subscribe to security notifications: https://github.com/Hyperpolymath/Kaldor-IIoT/security/advisories
Thank you for helping keep Kaldor and our community safe!