If you discover a security vulnerability in Bastion itself (not in code that Bastion scans), please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please:
- Email: security@bastion.dev
- Subject line:
[Bastion Security] Vulnerability Report - Include: Description of the vulnerability, steps to reproduce, potential impact
We will acknowledge receipt within 48 hours and provide a timeline for resolution.
Bastion is a set of markdown skill files with no runtime dependencies. The attack surface is minimal:
- Skill files (SKILL.md) — Read-only instructions for AI agents. No code execution.
- Hook scripts (session-start) — Bash script that reads a markdown file and outputs JSON. Reviewable in full.
- Agent definitions (agents/*.md) — Prompt templates for subagents. No code execution.
Bastion scans your code for vulnerabilities, but Bastion itself does not:
- Execute any code
- Connect to any external services
- Store or transmit any data
- Access your filesystem beyond reading markdown files
Bastion has zero dependencies. There is no supply chain risk.