Security

Security Policy

Last updated: February 15, 2026

Security is the foundation of ShorShield. This document outlines our security architecture, responsible disclosure guidelines, and incident response procedures.

1. Security Architecture Overview

ShorShield operates on a defense-in-depth model with multiple independent security layers:

๐Ÿ” Cryptographic Layer

ML-KEM-1024 + AES-256-GCM for encryption, ML-DSA-65 for authentication. All NIST-standardized post-quantum algorithms.

๐Ÿ‘๏ธ Zero-Knowledge

Client-side encryption/decryption. Server stores only ciphertext and public keys. Private keys never leave the user's device.

๐Ÿ”’ Transport Security

TLS encryption (HTTPS enforced), HTTP-only cookies, SameSite=Strict, session fingerprinting, HSTS.

๐Ÿ›ก๏ธ Application Security

Input sanitization, CSP headers, rate limiting, nonce-based replay protection, comprehensive audit logging.

2. Responsible Disclosure

๐Ÿ›ก๏ธ We welcome security researchers. If you discover a vulnerability in ShorShield, we ask that you report it responsibly so we can address it before it's publicly disclosed.

How to Report

  1. Email your findings to shorshield@gmail.com
  2. Include a detailed description of the vulnerability
  3. Provide steps to reproduce the issue
  4. If possible, suggest a fix or mitigation
  5. Do not publicly disclose the vulnerability until we've had time to respond

What We Commit To

Scope

The following are in scope for responsible disclosure:

๐Ÿšซ Out of scope: Denial of service attacks, social engineering of staff, physical intrusions, attacks on third-party services, and automated scanning without prior coordination.

3. Incident Response

In the event of a confirmed security incident, we follow this protocol:

  1. Containment โ€” Isolate affected systems, revoke compromised credentials
  2. Assessment โ€” Determine scope, identify affected data, analyze attack vector
  3. Notification โ€” Inform affected users within 72 hours per GDPR requirements
  4. Remediation โ€” Deploy fix, rotate affected keys, update security controls
  5. Post-Mortem โ€” Conduct root cause analysis, document lessons learned, update defenses

4. Security Headers

All ShorShield pages are served with the following security headers:

5. Compliance

6. Contact

Security concerns: shorshield@gmail.com
PGP key available upon request for encrypted communication.