Sentinel is infrastructure that sits at the edge of the web. Security is foundational to its design.
| Version | Supported |
|---|---|
| 0.3.x | ✅ |
| < 0.3 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, report them privately via GitHub:
You can use GitHub's private vulnerability reporting if enabled, or contact directly via GitHub.
Please include:
- Description — What is the vulnerability?
- Impact — What can an attacker do with this?
- Reproduction — Steps to reproduce the issue
- Affected versions — Which versions are affected?
- Suggested fix — If you have one
- Acknowledgment — Within 48 hours
- Initial assessment — Within 7 days
- Resolution timeline — Depends on severity, but we aim for:
- Critical: 24-48 hours
- High: 7 days
- Medium: 30 days
- Low: Next release
- We follow coordinated disclosure
- We will credit reporters (unless you prefer anonymity)
- We will publish a security advisory once a fix is available
Sentinel's security is built on the principles in our Manifesto:
- Explicit over implicit — No hidden defaults or magic behavior
- Bounded resources — Memory limits, queue depths, timeouts
- Isolated complexity — Security logic in external agents, not the core
- Observable decisions — Every security decision is logged and metered
- Memory-safe implementation (100% Rust)
- No unsafe code in core proxy
- TLS with modern cipher suites
- Rate limiting (local and distributed)
- External agent isolation (crash boundaries)
- Request validation and sanitization
- WASM agents run in-process (sandboxed via Wasmtime)
- Agent protocol v1 does not encrypt UDS traffic (use v2 with gRPC+TLS for sensitive environments)
Security updates are announced via: