Cirrus Erase — Security

This page is the canonical public source for Cirrus Erase security contacts. If you've found a vulnerability, please report it privately via one of the channels below. Do not file a public GitHub issue for security reports.

Contacts

Primary

Email: security@cirruserase.com

PGP fingerprint:

25DF C03A 27EB 601D F5CA D641 1608 5930 DAD1 793F

PGP key: download combined .asc (primary + secondary), or primary only. Also on keys.openpgp.org.

This mailbox routes to the Cirrus Erase team's group inbox. It is the stable, long-lived primary contact; this address will not change.

Secondary

Name: Jon Godfrey

Email: jon.a.godfrey@gmail.com

PGP fingerprint:

AA36 4D31 596A 8300 7C64 15BA E353 D3F7 F3E6 AA29

PGP key: download .asc. Also on keys.openpgp.org.

Independent backup contact, running on infrastructure separate from cirruserase.com. Use this only if the primary is unreachable. This contact may be rotated; the canonical current value is whatever this page shows.

What to include in a report

What to expect

Boot-chain integrity

Cirrus Erase ships a Microsoft-signed UEFI shim signed under the "Cirrus Erase" vendor identity. The shim signature can be inspected with sbverify or pesign.

If you find a binary attributed to Cirrus Erase that fails signature verification against the Microsoft UEFI CA, report it via the primary contact above — this would indicate either a key compromise or a binary-substitution attack, both of which we treat as the highest severity.

For the record:

Published advisories

Past security advisories are listed at /advisories.