Craton Shield

Maintainers

Maintainers

This file lists the current maintainers of Craton Shield and their areas of responsibility. Craton Shield is maintained by Craton Software Company.

Active Maintainers

Project Lead

NameGitHubArea
Craton Founders@craton-co/foundersOverall direction, final authority

Core Maintainers

Responsible for the core/ crates: shared runtime, crypto primitives, key management, and attestation.

NameGitHubArea
Core Team@craton-co/core-maintainerscore/ crates

Domain Maintainers

Responsible for domain-specific crates and platform integrations.

NameGitHubArea
Auto Team@craton-co/auto-maintainersauto/ -- Automotive security
Embedded Team@craton-co/embedded-maintainersembedded/ -- Embedded targets
Industrial Team@craton-co/industrial-maintainersindustrial/ -- OT/ICS security

Security Team

Responsible for cryptographic correctness, key management, secure boot chains, and vulnerability response.

NameGitHubArea
Security Team@craton-co/security-teamCrypto, key management, secure boot, vulnerability triage

Responsibilities

  • Code review: All PRs require at least one maintainer approval before merge. Security-critical changes additionally require Security Team sign-off.
  • Release management: Cutting releases, updating CHANGELOG.md, tagging versions, and publishing crate artefacts.
  • Security response: Triaging and resolving vulnerability reports per SECURITY.md. Target response within 48 hours; patches within 72 hours for critical issues.
  • Architecture decisions: Approving new crates, breaking changes, and dependency additions via the RFC process described in GOVERNANCE.md.
  • Community health: Responding to issues, reviewing community PRs, mentoring contributors, and enforcing the Code of Conduct.

Escalation Path

  1. Domain question or PR review: Tag the relevant domain maintainer team.
  2. Cross-domain or architectural decision: Tag @craton-co/core-maintainers.
  3. Security vulnerability: Email security@craton.com.ar. Do not open a public issue. See SECURITY.md for the full disclosure process.
  4. Governance or dispute resolution: Tag @craton-co/founders.

Contact

Becoming a Maintainer

Active contributors who demonstrate sustained, high-quality contributions over at least 6 months may be invited to join the maintainer team. Candidates should show strong understanding of embedded security principles and Rust safety practices. See GOVERNANCE.md for details.

Individual Contributor Transparency

The maintainer slots above are currently listed as GitHub team handles because Craton Shield is at an early stage of community growth. As the project matures, individual contributors who reach maintainer status should be listed by name to provide accountability and allow the community to direct thanks, questions, and mentorship requests to specific people.

Guidelines for listing individual maintainers:

  • A contributor who has been invited as a maintainer after meeting the 6-month criteria above should be added to the relevant table as a named row alongside or instead of the team handle, in the format:

    | First Last | [@github-handle](https://github.com/github-handle) | Area description |
    
  • Individual entries take precedence over team entries for routing review requests; list the most relevant individual first.

  • When a named maintainer becomes inactive (no review, commit, or issue response for 90 days) they should be moved to an Emeritus subsection below the active table rather than deleted, preserving attribution.

  • External contributors are encouraged to self-nominate by opening an issue tagged maintainership; the founding team will respond within 30 days.

This policy ensures that community members know who to work with, and that individuals receive appropriate credit for their long-term contributions to a safety-critical project.

Bus Factor Mitigation

  • All maintainers have full repository access.
  • CI/CD secrets are stored in GitHub organization-level secrets, accessible to all maintainers.
  • Release signing keys are held by at least two maintainers.
  • The project is licensed under Apache-2.0, ensuring it remains freely available regardless of maintainer availability.