Security

Threat model · v1.0 · 2026-05-09

This page is the short version. The exhaustive document lives in SECURITY.md in the repository, alongside the audit log of cryptographic decisions.

What zz-drop protects

What zz-drop does not protect — yet

Out of scope

Verifying the install script

The Linux one-liner downloads install.sh over TLS. Before executing, you can verify its minisign signature against the public key below.

curl -fsSLO https://zz-drop.net/install.sh
curl -fsSLO https://zz-drop.net/install.sh.minisig
minisign -Vm install.sh -P <draft — replaced at v1.0.0>
sh install.sh

🚧 Draft key. This is a placeholder. The real release-signing key is generated when the v1.0.0 build pipeline ships and will appear here before the first public release. Do not verify production binaries against this string.

Public key

untrusted comment: zz-drop release signing key v1 (DRAFT) <draft — replaced at v1.0.0>

The same key signs every release tarball and the standalone Linux binaries. Key rotation, if it ever happens, will be announced via a signed advisory in the repository and a new key published here with a 30-day overlap.

Reporting a vulnerability

Email security@zz-drop.net. PGP fingerprint and disclosure window are in SECURITY.md. We aim to acknowledge within 72 hours and ship a fix within 30 days for severity high or critical.