The Carbon Development Platform (CDP) takes security seriously. This page explains how to report vulnerabilities privately, what’s in scope for the open-source code we publish on GitHub, and what you can expect from us.
This policy applies to all public repositores under the 'carbonengine' Github organization and any packages/images we publish from those repos. It does not cover CCP's production game services or player accounts (EVE Online, EVE Frontier, etc.). If your finding relates to CCP games or live services, please follow the company's Vulnerability Disclosure Program and contact [email protected].
- Please DO NOT open a public issue for security problems.
Email [email protected] with the subject line:
Vulnerability Report: <brief description>Include as much detail as you can: - Commit hash or release tag
- Steps to reproduce (from a clean clone)
- Technical details (logs, requests/responses, payloads)
- Impact (what an attacker could achieve)
- Environment (OS, compiler/interpreter, build system)
- Your contact info and whether you prefer to remain anonymous If you’re unsure whether something qualifies as a security issue, send it anyway and we’ll help triage.
- Acknowledgement: We aim to respond within 3 business days.
- Triage: Initial validity/severity review within 7 business days.
- Fix: We prioritise based on impact and complexity. For critical issues, we work to validate within 14 days and target a fix as quickly as feasible.
- Coordinated disclosure: By default, we ask for up to 90 days from validation to publish details, but we’ll coordinate with you on timing.
- Credit: With your permission, we may acknowledge you in release notes or a SECURITY.md “Thanks” section. For sensitive reports, we may use GitHub Security Advisories to collaborate privately until a fix is released.
We provide security fixes for:
- The
mainbranch - The most recent tagged release per repository
Older releases, archived modules, or forks are not supported for security patches.
The following are not considered security issues for this policy:
- Bugs/crashes with no security impact
- DoS via oversized inputs, fuzzing, or load tests
- Findings that require access only to your own account/data
- Third-party dependency vulnerabilities (please report upstream); if they impact Carbon, include the specific exploit path
- Social engineering or phishing
- Issues in CCP production services (report to [email protected] under the main VDP instead) If in doubt, ask us first at [email protected].
When a fix is ready, we will:
- Patch and publish a tagged release if applicable
- Note the issue in CHANGELOG/release notes and, where appropriate, open a GitHub Security Advisory
- Coordinate public disclosure timing with the reporter
- Primary: [email protected]
- Back-up (non-sensitive questions): open a GitHub Discussion in the relevant repo Thank you for helping keep Carbon (and the developers who depend on it) safe.