Documents
SECURITY
SECURITY
Type
External
Status
Published
Created
Mar 25, 2026
Updated
Mar 25, 2026

Security Policy#

Reporting a Vulnerability#

If you discover a security vulnerability in Pipelock, please report it responsibly.

Do NOT open a public GitHub issue for security vulnerabilities.

Instead, please use GitHub Security Advisories to report vulnerabilities privately.

Include:

  • Description of the vulnerability
  • Steps to reproduce
  • Impact assessment
  • Suggested fix (if any)

Response Timeline#

  • Acknowledgment: Within 48 hours
  • Initial assessment: Within 1 week
  • Fix and disclosure: Coordinated with reporter, typically within 30 days

Scope#

The following are in scope:

  • Bypass of URL scanning (blocklist, DLP, entropy)
  • SSRF vulnerabilities in the fetch proxy
  • Bypass of MCP response scanning (prompt injection evasion)
  • Ed25519 signature forgery or verification bypass
  • Integrity monitoring bypass (undetected file modification)
  • Audit log injection or tampering
  • Config parsing vulnerabilities
  • Privilege escalation in network restriction mode
  • Any issue that could lead to credential exfiltration

Supported Versions#

VersionSupported
1.xYes
0.xNo

Security Design#

Pipelock's security model is documented in the README. Key design decisions:

  1. Opt-in MITM only: TLS interception is disabled by default and requires explicit CA setup (pipelock tls init). Without it, security comes from capability separation, not inspection.
  2. Defense in depth: Multiple scanner layers (blocklist, DLP, entropy) each catch different attack vectors.
  3. Honest claims: We document what each mode prevents vs. detects. See the security matrix in the README.