| Version | Supported |
|---|---|
| 0.1.x | ✅ |
DO NOT create public GitHub issues for security vulnerabilities.
- Email: Send details to security@fslint.org (or file maintainer email)
- Encrypted Communication: Use PGP key if available (see .well-known/security.txt)
- Response Time: You will receive acknowledgment within 48 hours
- Disclosure Timeline: We aim to release fixes within 90 days
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
See .well-known/security.txt for up-to-date contact information per RFC 9116.
- Keep Updated: Always use the latest version
- Verify Downloads: Check signatures and checksums
- Review Configs: Audit plugin configurations before use
- Limit Permissions: Run with minimal required privileges
- Hidden Files: Use
--include-hiddenflag carefully
- Input Validation: Validate all file paths and content
- No Arbitrary Execution: Never execute arbitrary commands
- Resource Limits: Implement timeouts and size limits
- Safe Dependencies: Audit all dependencies
- Error Handling: Use Result types, avoid panics
- Risk: May detect false positives
- Mitigation: Review findings before taking action
- Privacy: Scan results stay local (offline-first)
- Risk: FSLint reads file metadata and content
- Mitigation: System directory protection, hidden file warnings
- Permissions: Respects OS-level file permissions
- Risk: Plugins execute code in your process
- Mitigation: Only use trusted plugins, review source code
- Future: WASM sandboxing planned for v0.2.0
- System Directory Protection: Refuses to scan /system, /windows, etc.
- Hidden File Warnings: Alerts when ratio of hidden:visible files is suspicious
- Path Sanitization: Prevents path traversal attacks in output
- Memory Safety: Rust's ownership system prevents buffer overflows
- Offline-First: No network calls, works air-gapped
- All scans log to stderr (can be captured)
- Configuration changes tracked in config file
- Git integration shows file modification history
We follow responsible disclosure:
- Report received: Acknowledge within 48 hours
- Triage: Assess severity within 7 days
- Fix development: Coordinate with reporter
- Security advisory: Publish when fix is ready
- Credit: Reporter credited in CHANGELOG and advisory
Contributors who responsibly disclose vulnerabilities will be listed here.
None yet - be the first!
| Date | Auditor | Scope | Findings |
|---|---|---|---|
| 2025-11-22 | Self-audit | Initial release | 0 critical, 0 high |
- RFC 9116: security.txt in
.well-known/ - CWE Top 25: Mitigated by Rust's memory safety
- OWASP Top 10: Input validation, no injection vectors
- Security Email: See
.well-known/security.txt - PGP Key: See
.well-known/security.txt - Response Time: 48 hours acknowledgment, 7 days triage
Last updated: 2025-11-22