Gold Digger follows semantic versioning. Security updates are provided for the following versions:
| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| < 0.2.0 | ❌ |
We take security vulnerabilities seriously. Please report any security issues you discover.
- Go to the Security tab
- Click "Report a vulnerability"
- Fill out the security report form
- Provide detailed information about the vulnerability
- Email: support@evilbitlabs.io (for urgent or highly sensitive issues)
- GitHub Issue: Use the Security Report template (public disclosure - redact sensitive details)
When reporting a vulnerability, please provide:
- Description: Clear explanation of the security issue
- Severity: Critical, High, Medium, or Low impact
- Steps to Reproduce: Detailed reproduction steps
- Proof of Concept: Minimal code demonstrating the issue (redact sensitive data)
- Affected Versions: Which versions are vulnerable
- Environment: OS, architecture, enabled features
- Impact Assessment: Potential consequences
As a single maintainer project:
- Critical/High: 24-48 hours initial response
- Medium: 3-5 business days
- Low: 1-2 weeks
Security issues are prioritized over feature development.
- Credential Protection: Database URLs and credentials are never logged
- TLS Support: Secure database connections with native TLS or rustls
- Connection Validation: Proper error handling for connection failures
- No Credential Storage: Credentials are only read from environment variables
- SQL Injection Prevention: Uses parameterized queries via mysql crate
- Environment Variable Validation: Validates required configuration
- File Path Sanitization: Validates output file paths
- File Permissions: Respects system umask for output files
- No Sensitive Data in Output: Database credentials are never included in results
- Structured Output: Safe CSV, JSON, and TSV generation
- Use Environment Variables: Store database credentials in environment variables, not in scripts
- Enable TLS: Use
mysql://URLs with SSL parameters for encrypted connections - Limit Permissions: Use database users with minimal required permissions
- Secure Output: Store output files in secure locations with appropriate permissions
- Regular Updates: Keep Gold Digger updated to the latest version
- Security Reviews: All code changes undergo security review
- Dependency Scanning: Regular vulnerability scanning with
cargo audit - Secure Defaults: Security-focused default configurations
- Error Handling: No sensitive information in error messages
- Input Validation: Validate all external inputs
- CodeQL Analysis: Automated security scanning via GitHub Actions
- Dependency Scanning: Regular vulnerability checks with Dependabot
- Cargo Audit: Rust dependency vulnerability scanning
- SBOM Generation: Software Bill of Materials for supply chain security
- Code Reviews: All changes reviewed for security implications
- Penetration Testing: Periodic security testing of the application
- Configuration Audits: Regular review of security configurations
- Private Reporting: Security issues are reported privately first
- Coordinated Disclosure: Vulnerabilities are disclosed after fixes are available
- CVE Assignment: Critical and high-severity issues receive CVE assignments
- Public Disclosure: Security advisories published with fix details
- Discovery: Vulnerability is discovered and reported
- Assessment: Issue is assessed and severity determined
- Fix Development: Security fix is developed and tested
- Release: Fixed version is released
- Disclosure: Public disclosure with security advisory
- Maintainer: UncleSp1d3r
- GitHub: @unclesp1d3r
- Email: unclesp1d3r@evilbitlabs.io
This is a single-maintainer project. All security issues are handled by the primary maintainer.
We appreciate security researchers who responsibly disclose vulnerabilities. Contributors to security improvements will be acknowledged in:
- Release notes
- Security advisories
- Project documentation
This security policy is part of the Gold Digger project and is licensed under the MIT License.