The following versions of CraftCommand are currently supported with security updates:
| Version | Supported |
|---|---|
| 1.11.x (Stable) | ✅ (Current) |
| 1.10.x | |
| < 1.10 | ❌ |
Do not create a public issue for security vulnerabilities. Security is taken seriously, and I aim to patch critical issues within 48 hours of verification.
Please contact me directly through GitHub or via the Discord priority support channel with:
- A detailed description of the vulnerability.
- Steps to reproduce the issue (PoC/Exploit).
- Potential impact assessment.
- Suggested fixes (if any).
Once a patch is released, you will be credited for the discovery unless you prefer to remain anonymous.
CraftCommand implements several layers of defense-in-depth:
- Trio-State RBAC Engine: Granular permissions (Inherit, Allow, Deny) with strict role isolation: Owner > Admin > Manager > Viewer.
- Hierarchical Guard System: Prevents staff from elevating their own privileges or modifying accounts higher in the hierarchy.
- Network Isolation: Backend services bind to
127.0.0.1by default. Remote exposure requires explicit opt-in and owner-level "Remote Access Mode" activation. - Network Isolation (Panic Kill): Immediate, hard-termination of all external bridges (tunnels, proxies) via the "Panic Kill" protocol.
- Systems Integrity Engine: All updates are cryptographically signed with Ed25519 and verified via SHA256 hashing to prevent supply-chain attacks.
- Resource Stewardship: Active
ProcessLimiterandMemoryScalerServiceprevent Denial-of-Service (DoS) via resource exhaustion. - Zero-Config SSL: Automated self-signed certificate generation protects local LAN traffic with HTTPS/TLS.
- Atomic Persistence Layer: Database and configuration writes use atomic operations to prevent data corruption or partial state injection during system crashes.
- Audit Synchronization: Immutable logging of all sensitive actions (Permission changes, Logins, Server management) with high-fidelity timestamps.
- Session Security: JWT-based authentication with
bcryptjshashing and industry-standard token rotation.
- Path Traversal Protection: All file-based operations use strict sanitization and validation to prevent directory traversal.
- Instance Isolation: Minecraft servers run in isolated subdirectories within
minecraft_servers/. - Repository Pattern: Direct file I/O is abstracted and restricted to the Repository Layer, preventing ad-hoc file mutations elsewhere in the codebase.
- Update Regularly: Always run the latest stable version from the
mainbranch. - Environment Safety: Review allowed IPs in
servers.jsonand keep2FAenabled for sensitive roles. - Monitor Audit Logs: Regularly check the Audit Log tab for suspicious entry or configuration patterns.
Thank you for helping keep the CraftCommand ecosystem safe and secure!