Security

Security at EnforceGrid

We build governance infrastructure. Security is not a feature we can treat as optional — it is the job.

Responsible disclosure

If you've found a vulnerability in Steer or any EnforceGrid-operated infrastructure, please disclose it privately before publishing. We commit to:

Report vulnerabilities to: security@enforcegrid.com
PGP key available on request. For critical severity issues, please encrypt your report.

Scope

What is in and out of scope for security research:

TargetStatusNotes
github.com/EnforceGrid/steerIN SCOPECore enforcement engine — all findings welcome
Steer proxy request/response handlingIN SCOPEPolicy bypass, audit record tampering, payload leakage
Cedar policy evaluation engineIN SCOPEPolicy logic errors, evaluation bypass
enforcegrid.com websiteIN SCOPEStandard web vulnerabilities
Managed cloud infrastructureIN SCOPEContact us first — coordinated testing only
Third-party LLM providersOUT OF SCOPEReport directly to OpenAI, Anthropic, etc.
Social engineering of EnforceGrid staffOUT OF SCOPENot a valid research vector

Our security posture

Steer is designed around a principle we call zero-knowledge enforcement: the proxy evaluates policy against request metadata and context, but never requires access to the content of AI agent payloads to function. No payload data is stored by default. No telemetry leaves your network boundary in the open-source build.

Architectural commitments in the Steer enforcement engine:

Apache 2.0 Core SOC 2 · Roadmap OWASP ASI01–10 Aligned

Dependency security

Steer's open-source engine maintains a pinned dependency manifest. Security advisories for direct dependencies are reviewed within 48 hours of publication. We track upstream vulnerabilities in Cedar, the proxy runtime, and audit storage components.

To report a vulnerability in a dependency rather than Steer itself, please still email us — we'll coordinate upstream disclosure and apply patches promptly.

Bug bounty

We do not currently operate a formal bug bounty program. We do recognize contributors who identify meaningful vulnerabilities — reach out after responsible disclosure to discuss recognition. A structured bounty program is on our roadmap as the team scales.