| Version | Supported |
|---|---|
| 0.1.x | Yes |
If you discover a security vulnerability in NxPU, please report it responsibly:
- Do not open a public GitHub issue.
- Use GitHub's private vulnerability reporting to submit your report.
- Include a clear description of the vulnerability, steps to reproduce, and potential impact.
- Allow reasonable time for a fix before public disclosure.
We aim to acknowledge reports within 48 hours and provide an initial assessment within 5 business days.
NxPU is a compiler/transpiler that processes WGSL source code. Security concerns include:
- Denial of service: Maliciously crafted WGSL input causing excessive resource consumption.
- Memory safety: Unsafe memory access during IR processing.
- Output integrity: Incorrect code generation that could cause unexpected behavior on target hardware.
- The project is written in safe Rust with no
unsafeblocks in core crates. - All dependencies are tracked via
Cargo.lock. - CI runs
cargo clippywith-D warningsto catch common issues.