| Version | Supported |
|---|---|
| 0.3.x | Yes |
| < 0.3 | No |
If you discover a security vulnerability in SpiderShield, please report it responsibly:
- Do NOT open a public issue.
- Email security@teehoo.ai with:
- A description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- You will receive an acknowledgement within 48 hours.
- We aim to release a fix within 7 days for critical issues.
The following are in scope for security reports:
- Vulnerabilities in SpiderShield's scanning, guard, or DLP engine
- ReDoS in regex patterns used for security scanning
- Injection or bypass in the policy engine
- Unsafe deserialization or code execution in any module
The following are out of scope:
- Issues in scanned target repositories (report to those maintainers)
- Feature requests or non-security bugs (use GitHub Issues)
We follow coordinated disclosure:
- Reporter is credited in the release notes (unless they prefer anonymity)
- Public disclosure after the fix is released, or after 90 days
- CVE assignment for critical vulnerabilities when applicable
SpiderShield itself follows the same security standards it enforces:
- No
eval(),exec(), orpicklein core code - YAML loaded only via
yaml.safe_load() - All regex patterns are pre-compiled, not built from user input
- Subprocess calls use explicit argument lists (no
shell=True)