Skip to content

Security: SignalCoding/signal-sentinel-scanner

Security

SECURITY.md

Security Policy

Supported Versions

Version Supported
2.1.x
2.0.x
1.x.x ❌ End of life

Reporting a Vulnerability

We take security vulnerabilities seriously. If you discover a security issue in Signal Sentinel, please report it responsibly.

How to Report

DO NOT create a public GitHub issue for security vulnerabilities.

Instead, please email: security@signalcoding.co.uk

Include:

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact assessment
  • Any suggested remediation

What to Expect

  1. Acknowledgement: We will acknowledge receipt within 48 hours
  2. Assessment: We will assess the vulnerability within 7 days
  3. Resolution: Critical vulnerabilities will be patched within 30 days
  4. Disclosure: We will coordinate disclosure timing with you

Bug Bounty

We do not currently operate a bug bounty program, but we will publicly acknowledge security researchers who report valid vulnerabilities (with their permission).

Security Standards

Signal Sentinel is built to comply with:

  • OWASP Top 10 2025 - Web application security
  • OWASP Agentic AI Top 10 (2026) - AI agent security (ASI01-ASI10)
  • MOD JSP 440/656 - UK Defence secure development
  • NCSC Cyber Essentials Plus - UK government security baseline

Development Security

Code Review

  • All code changes require security-focused review
  • Security-critical changes require senior review

Dependencies

  • All dependencies are pinned to exact versions
  • Automated vulnerability scanning in CI/CD
  • No packages with known critical vulnerabilities

Secrets Management

  • No secrets in source code
  • Azure Key Vault / cloud-native secret stores only
  • Credentials never appear in logs

Supply Chain

  • SBOM generated for every release
  • Package integrity verification
  • Official registries only (NuGet, npm)

Security Features

Scanner

  • 21 security rules across MCP server and Agent Skill scanning
  • 13 MCP rules (SS-001 to SS-010, SS-019 to SS-021): tool poisoning, overbroad permissions, missing auth, supply chain, code execution, memory write, inter-agent comms, sensitive data, credential hygiene, OAuth 2.1 compliance, package provenance
  • 8 Skill rules (SS-011 to SS-018): prompt injection, scope violation, credential access, data exfiltration, obfuscation, script payloads, excessive permissions, hidden content
  • Cross-server attack path analysis
  • Supply chain integrity checks (hash pinning, typosquat detection)
  • OWASP Agentic AI Top 10 (ASI01-ASI10) + OWASP MCP Top 10 (MCP01-MCP10) dual compliance mapping
  • v2.1.1: SHA-pinned CI/CD, SSRF protection, symlink escape protection, regex timeouts, TLS enforcement, bounded reads

Gateway (Coming Soon)

  • Real-time tool call filtering
  • Response sanitisation (injection pattern removal)
  • PII redaction
  • Anomaly detection and kill switch

Contact


Copyright 2026 Signal Coding Limited. All rights reserved.

There aren’t any published security advisories