Skip to content

Security: lilcipherx/Bastion

Security

SECURITY.md

Security Policy

Reporting Vulnerabilities

If you discover a security vulnerability in Bastion itself (not in code that Bastion scans), please report it responsibly.

Do NOT open a public GitHub issue for security vulnerabilities.

Instead, please:

  1. Email: security@bastion.dev
  2. Subject line: [Bastion Security] Vulnerability Report
  3. Include: Description of the vulnerability, steps to reproduce, potential impact

We will acknowledge receipt within 48 hours and provide a timeline for resolution.

Scope

Bastion is a set of markdown skill files with no runtime dependencies. The attack surface is minimal:

  • Skill files (SKILL.md) — Read-only instructions for AI agents. No code execution.
  • Hook scripts (session-start) — Bash script that reads a markdown file and outputs JSON. Reviewable in full.
  • Agent definitions (agents/*.md) — Prompt templates for subagents. No code execution.

What Bastion is NOT responsible for

Bastion scans your code for vulnerabilities, but Bastion itself does not:

  • Execute any code
  • Connect to any external services
  • Store or transmit any data
  • Access your filesystem beyond reading markdown files

Supply Chain

Bastion has zero dependencies. There is no supply chain risk.

There aren’t any published security advisories