This page is the canonical public source for Cirrus Erase security contacts. If you've found a vulnerability, please report it privately via one of the channels below. Do not file a public GitHub issue for security reports.
Email: security@cirruserase.com
PGP fingerprint:
PGP key: download combined .asc (primary + secondary), or primary only. Also on keys.openpgp.org.
This mailbox routes to the Cirrus Erase team's group inbox. It is the stable, long-lived primary contact; this address will not change.
Name: Jon Godfrey
Email: jon.a.godfrey@gmail.com
PGP fingerprint:
PGP key: download .asc. Also on keys.openpgp.org.
Independent backup contact, running on infrastructure separate
from cirruserase.com. Use this only if the primary is unreachable.
This contact may be rotated; the canonical current value is whatever this page shows.
VERSION at the repo root, or
visible at http://<lan-server>:8080/api/version on a deployed LAN Server).Cirrus Erase ships a Microsoft-signed UEFI shim signed under the
"Cirrus Erase" vendor identity. The shim signature can be inspected with
sbverify or pesign.
If you find a binary attributed to Cirrus Erase that fails signature verification against the Microsoft UEFI CA, report it via the primary contact above — this would indicate either a key compromise or a binary-substitution attack, both of which we treat as the highest severity.
For the record:
.so is published with a known SHA-256. Reports of
.so substitution or modification at runtime are highest priority.Past security advisories are listed at /advisories.