PC_Workman is system monitoring software that requires administrative privileges to access hardware sensors and control fan speeds. This level of access demands rigorous security practices. This document outlines the security measures implemented in PC_Workman, how to report vulnerabilities, and what users can do to verify the safety of releases.
Starting with v1.6.3 (January 2026), PC_Workman implemented professional-grade security practices:
- Advanced CodeQL - Automated code scanning for vulnerabilities on every commit
- Private Vulnerability Reporting - Secure channel for security researchers to report issues
- Security Advisories - Public disclosure when issues are found and fixed
- Dependabot Alerts - Automatic notification of vulnerable dependencies
- Sigstore Digital Signatures - Cryptographic proof that releases are authentic
- VirusTotal Scanning - Every .exe tested against 70+ antivirus engines before release
- Documented Testing - Version numbers, dates, and results publicly recorded
- Reproducible Builds - Source code tagged and archived for each release
Status: Active
Available Since: January 20, 2026
Valid For: 90 days
Renewal: Automatic with each stable release
Every PC_Workman release is signed with Sigstore. Verify the signature:
sigstore verify github \
PC_Workman_HCK_<version>.exe \
--bundle sigstore.bundleIf signature verification fails, do not run the executable. Report the issue immediately.
Status: Active
Started: v1.6.3
Frequency: Every new .exe release
Current Status: 0/70 clean
Last Scanned: v1.6.4 (January 24, 2026)
Before publishing any executable, it is uploaded to VirusTotal and verified against 70+ antivirus engines. Users can verify this independently at virustotal.com.
Status: In Progress (25% complete)
Target: 100% compliance by v2.0
PC_Workman is working toward full compliance with OpenSSF Best Practices criteria:
Completed:
- Public version control (GitHub)
- Public discussion forums (Issues, Discussions)
- Clear contribution policy (CONTRIBUTING.md)
- Security reporting mechanism (this document)
- License declaration (MIT)
- Documented security practices
In Progress:
- Automated testing framework
- Code review process for all changes
- Continuous integration pipeline
- Automated dependency updates
- Security-focused code review guidelines
All requirements will be implemented systematically. Security recommendations from OpenSSF are treated as mandatory requirements, not suggestions.
Only the latest stable version receives active security support.
| Version | Supported | Security Updates | Notes |
|---|---|---|---|
| 1.6.x (latest) | Yes | Immediate | Active development branch |
| 1.5.x | Limited | Critical only | Upgrade recommended |
| < 1.5 | No | None | End of life |
Alpha/Beta builds receive security patches but may contain other stability issues. Production environments should use stable releases only.
Primary: GitHub Private Vulnerability Reporting
- Navigate to the Security tab
- Click "Report a vulnerability"
- Provide detailed information:
- Affected version(s)
- Reproduction steps
- Potential impact assessment
- Proof of concept (if applicable)
- Suggested fix (if known)
Alternative: Direct Email
If GitHub reporting is not accessible:
- Email:
firmuga.marcin.s@gmail.com - Subject:
[SECURITY] PC_Workman Vulnerability Report - Include all details listed above
- Do not open public issues for security vulnerabilities
- Do not disclose vulnerabilities publicly before patches are available
- Do not test exploits on production systems without explicit permission
Within 24 hours:
- Initial acknowledgment of report
- Confirmation that investigation has begun
Within 72 hours:
- Vulnerability validation or rejection
- Initial severity assessment
- Request for additional information (if needed)
Within 7 days:
- Fix available for critical vulnerabilities (CVSS 7.0+)
- Timeline provided for less critical issues
After Fix:
- Patched version released
- Security advisory published
- Reporter credited (unless anonymity requested)
- CVE assigned if applicable
Vulnerabilities are classified using CVSS v3.1:
- Critical (9.0-10.0): Remote code execution, privilege escalation
- High (7.0-8.9): Authentication bypass, data exposure
- Medium (4.0-6.9): Denial of service, information disclosure
- Low (0.1-3.9): Minor information leaks, configuration issues
Response urgency is prioritized based on severity and exploitability.
Official Distribution Channels:
- GitHub Releases: github.com/HuckleR2003/PC_Workman_HCK/releases
- Project Website: huckler2003.github.io/PC_Workman_HCK
Unofficial sources are not endorsed and may distribute modified or malicious versions:
- Third-party download sites
- File sharing platforms
- Mirror sites
- Torrent networks
Executables received via email, Discord, or other messaging platforms should be considered untrusted.
After download, verify the Sigstore signature before execution:
# Install sigstore CLI if not present
pip install sigstore
# Verify signature
sigstore verify github PC_Workman_HCK_<version>.exe --bundle sigstore.bundleExpected output: Signature verified successfully
If verification fails, delete the file immediately and report the issue.
Independent verification is recommended:
- Visit virustotal.com
- Upload the downloaded .exe file
- Review scan results
Expected result: 0/70+ detections
Any detections should be reported immediately. False positives are possible but rare.
Release notes include SHA256 hashes. Verify file integrity:
Windows PowerShell:
Get-FileHash PC_Workman_HCK_<version>.exe -Algorithm SHA256Linux/macOS:
sha256sum PC_Workman_HCK_<version>.exeCompare output with published hash in release notes.
PC_Workman is open source. Users can audit the code before use:
git clone https://github.com/HuckleR2003/PC_Workman_HCK.git
cd PC_Workman_HCK
git checkout tags/v<version>All releases are tagged and archived. Source code is available for inspection.
-
Manual Code Review
- Review all changes since last release
- Focus on privilege escalation vectors
- Verify input validation
- Check for hardcoded credentials or secrets
-
Automated Security Scanning
- CodeQL analysis (Python security queries)
- Dependency vulnerability scan (pip-audit)
- Static analysis (bandit, pylint security plugins)
-
Binary Security Testing
- VirusTotal scan (70+ engines)
- Sandbox execution testing
- Anti-malware false positive check
-
Cryptographic Signing
- Sigstore signature generation
- Signature bundle creation
- Public transparency log verification
-
Documentation Updates
- Update SECURITY.md with version/date
- Publish changelog with security fixes
- Update verification instructions
GitHub Security Features:
- CodeQL scans on every push to main branch
- Dependabot alerts for vulnerable dependencies
- Secret scanning for accidentally committed credentials
- Security advisories for disclosed vulnerabilities
Manual Monitoring:
- Daily review of GitHub issues and discussions
- Weekly dependency update checks
- Monthly security audit of core modules
PC_Workman uses third-party libraries documented in requirements.txt and DEPENDENCIES.md.
Dependency Security Process:
- All dependencies pinned to specific versions
pip-auditrun before each release- Security advisories monitored for all dependencies
- Vulnerable dependencies updated within 24 hours
- Breaking changes tested in isolation before merge
Current Dependencies with Security Implications:
psutil- System monitoring (regular security audits by maintainers)pyqt5- GUI framework (maintained by Riverbank Computing)- Additional dependencies listed in DEPENDENCIES.md
Security Improvements:
- Sigstore signature renewed
- VirusTotal scan: 0/70 clean (verified)
- SECURITY.md published and linked in README
- Private vulnerability reporting enabled on GitHub
- CodeQL configuration updated with additional security queries
Dependencies:
- No security updates required
- All dependencies current as of scan date
Security Implementations:
- First release with Sigstore digital signatures
- CodeQL automated scanning enabled
- GitHub Security Advisories configured
- VirusTotal testing implemented as standard practice
- Security policy documented
Dependencies:
- Initial pip-audit baseline scan: 0 vulnerabilities
In Scope:
- PC_Workman application code (Python source)
- Compiled executables (.exe)
- Build and release process
- Dependencies and supply chain
Out of Scope:
- Third-party services (GitHub, VirusTotal, etc.)
- User's local environment or system configuration
- Social engineering attacks
- Physical security
Permitted:
- Source code review and static analysis
- Sandboxed executable testing
- Dependency vulnerability research
- Build process verification
Not Permitted:
- Testing on production systems without permission
- Attacks targeting GitHub infrastructure
- Unauthorized access to development systems
- DoS attacks against any infrastructure
Security researchers who report valid vulnerabilities will be:
- Acknowledged in release notes (unless anonymity requested)
- Credited in SECURITY.md
- Listed in project contributors
- Provided with early access to fixes for verification
PC_Workman should not be blindly trusted. All security measures are transparent and verifiable:
- Source code is public and auditable
- Releases are cryptographically signed
- Executables are scanned by 70+ antivirus engines
- Security practices are documented and enforced
Users should verify these measures before granting administrative access.
No telemetry or analytics are collected.
Network activity is limited to:
- Optional AI diagnostic features (HCK_GPT) - only when explicitly used
- Manual update checks (if implemented in future versions)
Core system monitoring functions operate entirely offline. No data is transmitted to external servers without explicit user action.
No. Core functionality operates completely offline:
- System monitoring
- Fan control
- Performance tracking
- Diagnostic reporting
Internet access is only used for optional AI features, which require explicit user activation.
The repository remains public indefinitely. The license (MIT) permits:
- Forking the project
- Continuing development independently
- Commercial and non-commercial use
Source code and documentation will remain accessible.
Not currently. PC_Workman is developed by a single person with no funding.
However:
- All security reports are taken seriously
- Researchers are publicly credited
- Fixes are prioritized based on severity
- Transparency is maintained throughout the process
Security Vulnerabilities:
Use GitHub Private Vulnerability Reporting (preferred) or email firmuga.marcin.s@gmail.com
General Security Questions:
Open a GitHub Discussion in the Security category
Developer Contact:
Marcin Firmuga
- GitHub: @HuckleR2003
- X/Twitter: @hck_lab
- LinkedIn: /marcinfirmuga
Last Updated: January 24, 2026
Version: 1.0
Changes to this security policy are tracked in git commit history. Significant changes will be announced in release notes and project communications.
This policy is reviewed quarterly and updated as needed to reflect current practices and requirements.
PC_Workman Security Policy
Maintained by Marcin Firmuga | HCK_Labs
MIT | Open Source | Transparent by Design