If you discover a security vulnerability in Aliaser, please report it responsibly:
- DO NOT open a public GitHub issue
- Email the maintainers with details
- Allow reasonable time for a fix before public disclosure
- AES-256-GCM (NIST-approved)
- Authenticated encryption with additional data (AEAD)
- Random nonces for each encryption operation
- No IV/nonce reuse
- Argon2id (winner of Password Hashing Competition)
- Random 256-bit salt per vault
- Memory-hard function resistant to GPU/ASIC attacks
- Time and memory cost parameters follow OWASP recommendations
- Minimum 8 characters (recommended 16+)
- Password confirmation during setup
- Master password never stored (only hash)
- Separate hash for verification vs key derivation
- Sensitive data structures implement Zeroize
- Passwords cleared from memory after use
- Rust's memory safety guarantees prevent buffer overflows
- All vault data encrypted at rest
- Configuration file stores only hash and salt (no secrets)
- No network connectivity (offline-only)
- No telemetry or analytics
-
Strong Master Password
- Use 16+ characters
- Mix uppercase, lowercase, numbers, symbols
- Avoid common words or patterns
- Use a passphrase if easier to remember
-
Physical Security
- Encrypt your disk (LUKS, FileVault, BitLocker)
- Lock your computer when away
- Use secure boot if available
-
Backups
- Regularly export vault to secure location
- Store backups encrypted
- Test restoration periodically
- Keep backups offline or in encrypted cloud storage
-
Updates
- Keep Aliaser updated
- Monitor security advisories
- Rebuild from source for critical updates
-
Operational Security
- Run on trusted systems only
- Avoid compromised/malware-infected machines
- Use in private (shoulder surfing risk)
- Clear terminal history if sensitive
- No Cloud Sync: Manual export/import required for multi-device
- CLI Only: Terminal access required (GUI planned)
- Single User: No multi-user support
- No 2FA Storage: TOTP/U2F storage not implemented yet
This is open-source software. Professional security audit status: Not yet audited
You are encouraged to:
- Review the source code
- Run security analysis tools
- Report findings responsibly
All dependencies are regularly updated. Key security dependencies:
aes-gcm- Maintained by RustCrypto teamargon2- Reference implementationrand- RustCrypto random number generationzeroize- Secure memory clearing
Run cargo audit to check for known vulnerabilities in dependencies.
- No Custom Crypto: Use well-tested, standard libraries
- Defense in Depth: Multiple layers of protection
- Fail Securely: Errors don't leak information
- Minimal Attack Surface: Offline-only, no network code
- Auditability: Open source, readable code
- Disk theft (encryption at rest)
- Memory dumps (zeroization)
- Brute force (Argon2id)
- Unauthorized access (master password)
- Data tampering (AEAD authentication)
- Compromised operating system
- Keyloggers/malware on host
- Physical torture (XKCD 538)
- Quantum computers (future threat)
- Side-channel attacks (timing, power analysis)
- Network attacks (no network code)
- Social engineering
- Backup security (user responsibility)
- Hardware security modules
Planned enhancements:
- Post-quantum cryptography readiness
- Hardware security module support
- Biometric authentication integration
- Secure enclave support (SGX, SEV)
- Formal security audit
- Security-focused GUI implementation
- Report received → 24 hours: Acknowledgment
- 7 days: Initial assessment
- 30 days: Fix developed and tested
- 60 days: Public disclosure (if not fixed, coordinated disclosure)
For security issues: [Add your security contact email]
Remember: No software is 100% secure. Security is a process, not a product.