How to Report
Send security vulnerability reports to: Email: [email protected]What to Include
Please provide as much detail as possible to help us understand and validate the issue: Description of the vulnerability- What component or feature is affected
- Type of vulnerability (RCE, credential leak, etc.)
- Attack vector and preconditions
- Detailed reproduction steps
- Minimal test case or proof of concept
- Required configuration or environment setup
- Expected vs. actual behavior
- What an attacker could accomplish
- Affected user scenarios
- Scope of the vulnerability
- Any mitigating factors
- Proposed code changes or approach
- Alternative mitigations
- References to similar fixes in other projects
You don’t need to provide a complete fix. Even partial suggestions or ideas are helpful.
What to Expect
Acknowledgment
We will acknowledge receipt of your report within 48 hours. If you don’t receive an acknowledgment within this timeframe, please follow up to ensure your report was received.Validation and Communication
We will work with you to:- Understand and validate the issue
- Assess severity and impact
- Develop and test a fix
- Plan coordinated disclosure
- Validation results and severity assessment
- Estimated timeline for patch development
- Release planning and disclosure timeline
- Any additional information we need
Coordinated Disclosure
We follow responsible disclosure practices:- Private validation: We confirm and assess the vulnerability privately
- Fix development: We develop and test a patch
- Pre-disclosure notification: We may provide advance notice to critical users
- Public release: We release the fix and publish a security advisory
- Credit: We acknowledge the reporter (if desired) in the advisory
- Keep the vulnerability confidential until we release a fix
- Provide reasonable time for us to develop and deploy a patch
- Coordinate with us on disclosure timing and content
Scope
This security policy applies to the latest version of the project on thecanary branch.
In Scope
The following components are security-relevant and fully in scope for vulnerability reports: Shipped CLI and TUI- The distributed command-line interface and terminal UI
- Compiled artifacts in
build/andbin/ - Code included in the distributed npm package
- All artifacts distributed via the
@pensar/apexnpm package - Dependencies bundled with the package
- Installation and update mechanisms
- Credential storage and encryption (
src/core/credentials/) - Session management (
src/core/session/) - API key handling
- Authentication with external services
- Network protocol handling
- Response parsing from test targets
- User input validation
- File parsing and processing
Limited Scope
The following components are evaluated under a restricted threat model with contextual severity: Developer tooling and internal scripts- Scripts in
scripts/directory - Benchmark runners
- CI utilities and workflows (
.github/workflows/)
- Test files (
*.test.ts) - Development-only dependencies
- Local setup and configuration tools
- Code excluded by
package.jsonfilesfield - Code excluded by
.npmignore - Components not shipped in the npm package
Issues in limited-scope components are evaluated based on realistic threat models aligned with their intended usage. Severity reflects actual product exposure and blast radius, not theoretical worst-case impact.
Out of Scope
The following are generally considered out of scope and may be closed as informational: Local source code modification- Issues requiring the reporter to modify source code
- Attacks that only work after changing local files
- Malicious commits or local repository tampering
- A user injecting malicious content into their own files
- Users intentionally misconfiguring security settings
- Attacks requiring the victim to be the attacker
- Attacks requiring existing repository write access
- Attacks requiring local filesystem access beyond normal tool usage
- Issues that only affect users who already have administrative access
- No practical, realistic exploitation path
- Requires extensive preconditions unlikely in practice
- Purely academic issues without demonstrable impact
- Security recommendations without demonstrable vulnerability
- Hardening suggestions without actual weakness
- Compliance or policy improvements
- Findings in experimental features not yet released
- Issues in example code or scaffolding
- Vulnerabilities in deprecated or removed components
- Issues that require violating operational assumptions (see Threat Model)
- Attacks outside intended usage patterns
- Misuse of development-only features in production
Severity Classification
Severity is determined based on multiple factors:Product Exposure
Is the affected component shipped to users?- Shipped in npm package: Higher severity
- Development-only tool: Lower severity
- Not distributed: Informational or out of scope
Realistic Attack Surface
Does the vulnerability arise during normal, intended usage?- Normal penetration testing workflow: In scope
- Unusual configuration or development mode: Lower severity
- Requires source modification: Out of scope
Blast Radius
What is the scope of potential impact?- Critical: Credential theft, arbitrary code execution as different user
- High: Code execution in user context, sensitive data exposure
- Medium: Information disclosure of findings, privilege escalation within tool
- Low: Denial of service, minor information leaks
Alignment with Intended Usage
Does exploitation require deviating from documented workflows?- Normal operation: Full severity
- Undocumented features or flags: Reduced severity
- Development-mode only: Limited scope
- Source modification required: Out of scope
Local-only code execution within internal developer tooling does not automatically equate to production remote code execution. Severity classifications reflect the actual deployment context and user exposure of affected components.
Operational Risk vs. Vulnerabilities
Pensar Apex is a penetration testing tool that intentionally interacts with potentially hostile systems. Understanding the difference between vulnerabilities and operational risk is important.These Are Vulnerabilities
- Input validation flaws allowing target systems to execute code in Apex
- Credential leaks or insecure storage
- Session isolation failures allowing cross-session data exposure
- Injection vulnerabilities in Apex’s own code
- Authentication bypasses in Apex’s services
These Are Operational Risks (Not Vulnerabilities)
- Target systems fingerprinting Apex during normal scanning
- Malicious targets rate-limiting or blocking Apex
- Hostile services returning deceptive results
- Targets attempting to retaliate against scanning infrastructure
- Honeypots detecting and misleading the tool
Acknowledgment
We appreciate responsible security research. Valid, in-scope reports will be acknowledged in accordance with this policy. What we provide:- Prompt acknowledgment and communication
- Credit in security advisories (if desired)
- Collaboration on understanding and fixing the issue
- Recognition for helping secure Apex
- Monetary bug bounties
- Swag or merchandise
- Public recognition beyond security advisories
- Individual thank-you pages or hall of fame

