Please do not open a public issue for security vulnerabilities.
If you discover a security vulnerability in SureSign, please email us at security@daruks.com with:
- Description of the vulnerability
- Steps to reproduce (if applicable)
- Potential impact
- Suggested fix (if you have one)
We will:
- Acknowledge receipt of your report within 48 hours
- Investigate the vulnerability
- Develop and test a fix
- Release a patched version as soon as possible
- Credit you in the security advisory (unless you prefer to remain anonymous)
| Version | Status |
|---|---|
| v1.0.x | Actively supported |
We recommend always using the latest version for security updates.
When using SureSign:
- Keep your Rust and dependencies up to date
- Review the code before running it in production
- Use appropriate file permissions for certificates and keys
- Follow best practices for cryptographic key management
- Report any suspicious activity or potential vulnerabilities
SureSign uses:
- RSA: For digital signatures (RSA-2048 minimum recommended)
- AES-256: For encryption (when applicable)
- SHA-256: For hashing
All cryptographic operations use well-established libraries (rcgen, p12).
We regularly review and update our dependencies to ensure security patches are applied. You can check dependencies with:
cargo tree
cargo auditWe follow responsible disclosure practices:
- Day 0: Vulnerability reported
- Day 1-7: Initial assessment and verification
- Day 7-30: Development and testing of fix
- Day 30+: Public disclosure and release
Timelines may vary based on severity and complexity.