DaemonEye follows semantic versioning (SemVer) with security updates provided for the current major version and the previous major version.
| Version | Supported | Notes |
|---|---|---|
| 0.1.x | ✅ | Current development version |
| < 0.1 | ❌ | Pre-release versions not supported |
Note: As DaemonEye is currently in pre-1.0 development, we focus security updates on the latest 0.1.x series. Once we reach 1.0, we will support the current major version and one previous major version.
DaemonEye implements a three-component security architecture with strict privilege separation:
- procmond: Privileged process collector with minimal attack surface
- daemoneye-agent: User-space orchestrator for detection and alerting
- daemoneye-cli: Command-line interface for operators
- daemoneye-lib: Shared library providing core functionality
- Principle of Least Privilege: Components run with minimal required permissions
- Privilege Separation: Only procmond runs with elevated privileges when necessary
- Defense in Depth: Multiple security layers and validation points
- Zero Trust: No implicit trust between components or external systems
- Audit Trail: Certificate Transparency-style Merkle tree with cryptographic integrity
- Memory Safety: Built in Rust with
unsafe_code = "forbid"policy - Input Validation: Comprehensive validation with detailed error messages
- SQL Injection Prevention: AST validation with sqlparser, prepared statements only
- Credential Management: Environment variables or OS keychain, never hardcode secrets
- Attack Surface Minimization: No network listening, outbound-only connections
- Audit Trail: Certificate Transparency-style audit ledger with BLAKE3 and Merkle trees
- mTLS Authentication: Certificate chain validation for enterprise components
- Code Signing: SLSA Level 3 provenance, Cosign signatures
- Cryptographic Integrity: Merkle tree with inclusion proofs and periodic checkpoints
- Sandboxed Execution: Read-only database connections for detection engine
- Query Whitelist: Only SELECT statements with approved functions allowed
For security vulnerabilities in DaemonEye, please report them privately to:
- Email: support@evilbitlabs.io
- PGP Key: Available on our website
- Subject:
[SECURITY] DaemonEye Vulnerability Report
Please include the following information in your report:
- Description: Clear description of the vulnerability
- Impact: Potential security impact and affected components
- Reproduction: Steps to reproduce the issue (if applicable)
- Environment: OS, architecture, and DaemonEye version
- Timeline: Any disclosure timeline requirements
- Contact: Your preferred contact method for follow-up
- Initial Response: Within 48 hours of report receipt
- Status Updates: Weekly updates during investigation
- Resolution: Target resolution within 30 days for critical issues
- Disclosure: Coordinated disclosure following resolution
If Accepted:
- Acknowledgment within 48 hours
- Regular status updates during investigation
- Credit in security advisories (if desired)
- Early access to patches before public release
If Declined:
- Clear explanation of why the issue doesn't qualify
- Suggestions for alternative reporting channels if applicable
- Option to appeal the decision
- Keep Updated: Always run the latest version of DaemonEye
- Secure Configuration: Use strong authentication and encryption
- Monitor Logs: Regularly review audit logs for anomalies
- Principle of Least Privilege: Run components with minimal required permissions
- Network Security: Ensure secure communication channels for alert delivery
- Code Review: All security-related changes require thorough review
- Testing: Comprehensive security testing including fuzzing and penetration testing
- Dependencies: Regular security audits of dependencies
- Documentation: Document security considerations and threat models
- Training: Regular security training and awareness
Security advisories are published at:
- GitHub Security Advisories: github.com/EvilBit-Labs/DaemonEye/security/advisories
- Security Website: evilbitlabs.io/security
- Mailing List: Subscribe to support@evilbitlabs.io
We follow responsible disclosure practices:
- Private Reporting: Report vulnerabilities privately first
- Reasonable Time: Allow reasonable time for fixes before public disclosure
- Coordinated Release: Coordinate public disclosure with patch availability
- Credit: Provide appropriate credit to security researchers
- No Retaliation: We will not pursue legal action against good-faith security research
For general security questions or concerns:
- Email: support@evilbitlabs.io
- Website: evilbitlabs.io/security
- PGP: Available on our website for encrypted communication
Last Updated: September 2025 Next Review: September 2026