Security policy · RFC 9116

Reporting a vulnerability.

If you've found a security issue affecting PRML, falsify, falsify-inspect, prml-verify-action, the registry, or any related infrastructure: thank you. Please report it privately using one of the channels below. We aim to acknowledge within 72 hours and patch high-severity issues within 30 days.

Primary contact
[email protected]
GitHub Security Advisory (preferred for code-level issues)
github.com/studio-11-co/falsify/security/advisories/new

Scope

In scope:

Out of scope:

What counts as a vulnerability

The PRML threat model (v0.1 §5) is narrow. Examples that do count:

Examples that do not count (for this report channel):

Disclosure process

StepTarget
Initial acknowledgment72 hours
Triage + severity assessment7 days
Patch + release for high severity30 days
Public advisory + coordinated disclosureAfter patch ships

If you do not receive a reply within 7 days, you may escalate by tagging @cuneytozturk on a private GitHub Security Advisory.

Acknowledgments

We credit security researchers who consent to be named. (No reports received yet.)

RFC 9116 file

The machine-readable security policy is at /.well-known/security.txt.