CT-OpsCT-Ops
Home
Getting Started
Architecture
Features
Deployment
GitHub
GitHub
Home
Getting Started
Architecture
Features
Deployment
GitHub
GitHub
  • Introduction
  • Getting Started

    • Installation
    • Configuration
    • Offline Agent Install Bundle
  • Architecture

    • Architecture Overview
    • Agent Architecture
    • Ingest Service
    • Deployment Profiles
  • Features

    • Hosts & Inventory
    • Host Groups
    • Networks
    • Monitoring
    • Certificate Management
    • SSL Certificate Checker
    • Alerts
    • Notifications
    • Reports
    • Terminal
    • Service Accounts & Identity
    • Directory User Lookup
    • Tasks & Runbooks
    • Scheduled Tasks
    • Tags
    • Notes
  • Deployment

    • Docker Compose Deployment
    • Air-Gap Deployment
    • Load Testing
  • Development

    • End-to-end testing
  • Licensing
  • Security

Security & Vulnerability Disclosure

CT-Ops follows a coordinated vulnerability disclosure policy. The full text lives at SECURITY_DISCLOSURE.md in the repository.

Reporting a vulnerability

Do not open a public GitHub issue. Use one of:

  • GitHub Security Advisory (preferred): https://github.com/carrtech-dev/ct-ops/security/advisories/new
  • Email: security@infrawatch.io

Please include reproduction steps, affected version / commit / image digest, and any known mitigations.

What to expect

  • Acknowledgement within 3 business days.
  • Initial triage and severity assessment within 10 business days.
  • Target fix windows: 30 days for Critical / High, 90 days for Medium / Low.
  • We will agree a disclosure date with you before publishing any advisory.

security.txt

Every deployment serves /.well-known/security.txt as per RFC 9116. The file ships with the upstream project's contact details; operators running their own deployment may replace it with their own security contact so that researchers can reach the team responsible for that installation.

To override for a deployment, edit apps/web/public/.well-known/security.txt in your fork before building the image, or mount a replacement file over the path in your container.

Safe harbour

See SECURITY_DISCLOSURE.md for the full safe-harbour statement. In short: act in good faith, avoid data destruction or privacy violations, give us a reasonable window to remediate, and we will not pursue legal action.

Published advisories

Past and pending advisories are listed at https://github.com/carrtech-dev/ct-ops/security/advisories.

Edit this page on GitHub
Last Updated: 4/19/26, 8:01 PM
Contributors: Simon Carr, Claude Opus 4.7
Prev
Licensing