We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.1.x | ✅ |
| 1.0.x | ✅ |
| < 1.0 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
- Go to the Security tab
- Click "Report a vulnerability"
- Fill in the details
Send an email to: elis132@protonmail.com
Include the following information:
- Type of vulnerability
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue and how an attacker might exploit it
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 5 business days
- Status Updates: Every 7 days until resolution
- Resolution Timeline: Depends on severity
- Critical: 7-14 days
- High: 14-30 days
- Medium: 30-60 days
- Low: 60-90 days
When using Multi Audio Output:
-
Download Only from Official Sources
- GitHub Releases only
- Verify checksums (SHA256SUMS.txt)
-
Keep Software Updated
- Enable automatic updates (when available)
- Check for updates regularly
-
Review Permissions
- The app only requires audio device access
- No network access required
- No administrator rights needed
-
Settings File
- Settings are stored in
%APPDATA%\MultiAudioOutput\settings.json - Contains only device preferences
- No sensitive data stored
- Settings are stored in
Multi Audio Output requires access to:
- WASAPI loopback capture (read audio from devices)
- WASAPI render (write audio to devices)
This is standard for audio routing applications and poses no security risk.
When "Start with Windows" is enabled:
- Writes to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run - Only stores application path
- Removed on uninstall or when option disabled
Multi Audio Output:
- Does NOT connect to the internet
- Does NOT collect telemetry
- Does NOT send any data
- Operates entirely locally
When a security vulnerability is reported and confirmed:
- Patch Development: Develop and test fix
- Security Advisory: Create GitHub Security Advisory
- Release: Publish patched version
- Announcement: Notify users via GitHub Release notes
- Credit: Reporter credited in CHANGELOG (if desired)
We thank the following individuals for responsibly disclosing security issues:
No vulnerabilities reported yet
Last Updated: January 29, 2026