| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do NOT report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in ObsidianQ, please report it responsibly:
- Email: Contact the maintainer directly via GitHub profile.
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Fix & Disclosure: Coordinated with the reporter
ObsidianQ follows these security principles:
- Constant-Time Execution: All operations on secret data (NTT, Montgomery reduction, Barrett reduction) are implemented without data-dependent branching.
- Off-Heap Key Storage: Private keys and shared secrets are stored in native Rust memory, outside the JVM heap, preventing GC-based memory leakage.
- Zeroization: All secret key structures implement
Zeroize+ZeroizeOnDropto ensure deterministic memory cleanup. - No Secret Logging: The codebase never logs, prints, or serializes private key material.