The CoT Sentinel team takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
Please do not report security vulnerabilities through public GitHub issues.
Send vulnerability reports to: security@blackdottech.com
Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Affected versions
- Potential impact assessment
- Any suggested fixes (optional)
| Timeframe | Action |
|---|---|
| 24 hours | Acknowledgment of your report |
| 72 hours | Initial assessment and severity determination |
| 7 days | Status update on remediation progress |
| 90 days | Target resolution for most issues |
We will keep you informed throughout the process and credit you in the release notes (unless you prefer anonymity).
The following are in scope for security reports:
- Authentication and authorization bypasses
- SQL injection, command injection, or code execution
- Cross-site scripting (XSS) or cross-site request forgery (CSRF)
- Sensitive data exposure (credentials, certificates, audit logs)
- Cryptographic weaknesses
- Privilege escalation
- Path traversal or file access vulnerabilities
The following are out of scope:
- Vulnerabilities in dependencies (report these upstream, but notify us)
- Issues requiring physical access to the server
- Social engineering attacks
- Denial of service attacks
- Issues in third-party TAK Server software
| Version | Supported |
|---|---|
| 1.5.x | ✅ Yes |
| 1.4.x | |
| < 1.4 | ❌ No |
When deploying CoT Sentinel:
- Always use HTTPS — Run
setup_https.shbefore production deployment - Change default credentials — Never use default passwords in production
- Restrict network access — Limit access to trusted networks or VPN
- Enable audit logging — Monitor the audit log for suspicious activity
- Regular updates — Keep CoT Sentinel and all dependencies current
- Backup encryption keys — Store certificate backups securely offline
See SECURITY_AUDIT_REPORT.md for details on past security reviews and remediation.
For encrypted communications, use our PGP key:
[PGP key to be added]
Key fingerprint: [Fingerprint to be added]