Axivum · Security

Reporting a vulnerability in AEGIS

If you've found a security issue in AEGIS or any service running on axivum.io, here's how to tell us. We respond to every report.

Contact

Send reports to

You can also use the contact form at /contact if you don't want to send email. Mark the message as security-related so it routes correctly.

If you need to encrypt: drop us a line at the address above and we'll exchange a key out-of-band.

Response SLA

What's in scope

In scope
  • axivum.io and subdomains
  • The AEGIS Worker (/api/*)
  • The dashboard (/dashboard)
  • Auth flows (login, MFA, password reset, signup)
  • Multi-tenant isolation bugs
  • The agentic action system (T0–T3)
Out of scope
  • Third-party services (Cloudflare, Resend, Groq) — report to them directly
  • Findings that require physical access
  • Self-XSS or social-engineering of our own staff
  • Volumetric DDoS — Cloudflare handles those
  • SPF/DMARC/DKIM hardening (we know; tracked)
  • "unsafe-eval" in CSP (known; see ADR 0003)

Safe harbor

We will not pursue legal action against researchers who:

What we don't do (yet)

Recent acknowledgements

None yet — be the first.

Public threat model & ADRs

Our threat model lives in the repo at docs/THREAT_MODEL.md, and our architecture decisions are in docs/adr/. Both are public. If you spot a gap there before you spot a vulnerability, we'd love to hear about it too.