| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in System//Zero, please report it by:
- DO NOT open a public issue
- Email security details to the maintainers privately
- Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Suggested fix (if available)
- Initial Response: Within 48 hours of report
- Status Update: Within 7 days with assessment
- Fix Timeline: Critical vulnerabilities patched within 30 days
- Hash chains in audit logs are tamper-evident but not cryptographically signed
- Log files should be stored with appropriate filesystem permissions (read-only after write)
- Consider additional encryption for logs containing sensitive UI data
- YAML templates are loaded from the filesystem without sandboxing
- Only load templates from trusted sources
- Validate template structure before deployment
- Requires system-level permissions to read UI state
- May capture sensitive information from applications
- Ensure compliance with organizational privacy policies
- API server (
interface/api/server.py) should only bind to localhost in production - Use authentication/authorization for any network-exposed endpoints
- Do not expose raw logs via API without access controls
- Principle of Least Privilege: Run with minimal required system permissions
- Log Rotation: Implement retention policies for immutable logs
- Access Control: Restrict read access to captured UI trees and drift logs
- Monitoring: Regularly verify hash chain integrity using
ImmutableLog.verify_integrity() - Updates: Keep dependencies updated to address known vulnerabilities