CortexAI follows semantic versioning and maintains security support for the following versions:
| Version | Supported | Status |
|---|---|---|
| 1.3.x | ✅ | Current stable release |
| 1.2.x | ✅ | Security fixes only |
| 0.x.x | ❌ | Development versions - not supported |
Note: Given CortexAI's nature as a security testing tool, I prioritize rapid security updates. Only the latest minor version receives feature updates, while the previous minor version receives critical security patches for 6 months after the next minor release.
For security vulnerabilities in CortexAI itself, please report responsibly:
- Email: Send details to
chris.dickinson@mailfence.comwith subject line:[SECURITY] CortexAI Vulnerability Reportand ensure you are using a PGP key - GitHub Security Advisories: Use GitHub's private vulnerability reporting feature
- Do NOT create public GitHub issues for security vulnerabilities
For sensitive vulnerability reports, please use PGP encryption:
- PGP Key: 0xBAE74ED3A768A498
- Fingerprint: 2D4BAA9AD587A636050F5456BAE74ED3A768A498
- Key Server: OpenPGP
You can also find the public key at: https://github.com/theelderemo.gpg
Please provide:
- Description: Clear description of the vulnerability
- Impact: Potential security impact and affected components
- Reproduction: Step-by-step instructions to reproduce
- Environment: CortexAI version, Node.js version, operating system
- Proof of Concept: Code or screenshots demonstrating the issue
- Suggested Fix: If you have ideas for remediation
- Initial Response: Within 24-48 hours acknowledging receipt
- Assessment: Within 5 business days - vulnerability assessment and severity classification
- Fix Timeline:
- Critical: 1-3 days
- High: 1-2 weeks
- Medium: 2-4 weeks
- Low: Next planned release
- Disclosure: Coordinated disclosure after fix is available
If Accepted:
- I'll work with you on a fix and coordinate disclosure
- You'll be credited in release notes (unless you prefer anonymity)
- I may offer a token of appreciation for significant findings
If Declined:
- I'll provide clear reasoning why it's not considered a security issue
- You're free to disclose publicly after my assessment
- I may suggest alternative improvement channels (feature requests, etc.)
Given that CortexAI is a penetration testing tool:
- Authorized Use Only: CortexAI should only be used against systems you own or have explicit permission to test
- Data Sensitivity: Project databases may contain sensitive vulnerability data - secure them appropriately
- API Keys: Protect your Azure OpenAI API keys and rotate them regularly
- Network Isolation: Consider running CortexAI in isolated environments for sensitive assessments
- Log Security: Audit logs may contain sensitive information - handle with appropriate data retention policies
If you discover vulnerabilities in other systems while using CortexAI:
- Follow Responsible Disclosure: Report to the affected organization first
- Don't Exploit: Only perform testing within authorized scope
- Document Properly: Use CortexAI's evidence collection features responsibly
- Respect Timelines: Allow reasonable time for fixes before any public disclosure
- Keep CortexAI updated to the latest supported version
- Use strong, unique API keys for Azure OpenAI
- Regularly backup and encrypt project databases
- Run CortexAI with minimal necessary privileges
- Monitor logs for unusual activity
- Follow secure coding practices
- Validate all user inputs
- Use parameterized queries for database operations
- Implement proper error handling without information leakage
- Include security considerations in pull request descriptions
I recognize security researchers who help improve CortexAI's security:
This section will be updated as I receive and address security reports.
Remember: CortexAI is designed to help identify security vulnerabilities. Please use it responsibly and ethically, with proper authorization, and follow all applicable laws and regulations.