MalPromptSentinel (MPS) is a security tool. We take security issues seriously.
Email: StrategicPromptArchitect@gmail.com
Subject Line: SECURITY - MPS Vulnerability Report
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Pattern bypasses - Attacks that evade detection
- False negatives - Dangerous content marked as safe
- Code vulnerabilities - Bugs in scanner logic
- Regex exploits - ReDoS or other regex attacks
- Information disclosure - Unintended data exposure
- Known limitations - Evasion techniques (documented)
- Performance issues - Slow scans, high memory
- Feature requests - Use contribution process instead
| Action | Timeframe |
|---|---|
| Acknowledgment | 48 hours |
| Initial Assessment | 1 week |
| Fix Development | 2-4 weeks |
| Public Disclosure | After fix released |
- Report privately via email
- Allow time for fix development
- Coordinate disclosure timing with maintainer
- Credit given to reporter (unless anonymity requested)
MPS has documented limitations that are NOT vulnerabilities:
- Base64 encoding bypasses pattern matching
- Hex/URL encoding not fully decoded
- Leetspeak substitution partially detected
- Unicode obfuscation limited detection
This is by design - Pattern-based detection has inherent limits.
- No conversation state tracking
- Multi-turn attacks not detected
- Session manipulation limited detection
Mitigation: Use MPS as part of defense-in-depth strategy.
When using MPS:
- Don't rely solely on MPS - Use multiple security layers
- Review ORANGE results - Require human judgment
- Always block RED - High confidence attacks
- Monitor for bypasses - Report new attack patterns
- Keep updated - Use latest version
This security policy covers:
quick_scan.pydeep_scan.pymps_patterns.py- Supporting scripts
Does NOT cover:
- Test framework (mps-test-agent)
- Documentation
- Example code
Security Issues: StrategicPromptArchitect@gmail.com
General Questions: Same email, different subject line
Website: https://StrategicPromptArchitect.ca
Security researchers who report valid vulnerabilities will be:
- Credited in CHANGELOG (unless anonymity requested)
- Acknowledged on website (with permission)
- Thanked publicly (with permission)
Thank you for helping keep MPS secure!