| Version | Supported |
|---|---|
| Latest release on GitHub | Yes |
| Older tags | Best effort |
BLIP is a local-network P2P app. Treat your LAN like a trust boundary: anyone on the same broadcast domain may attempt to interact with discovery or open TCP sessions to advertised ports.
Please do not file public issues for undisclosed security problems.
Instead:
- Open a private vulnerability report via GitHub (Security → Advisories → Report a vulnerability), if enabled for the repository, or
- Contact the maintainer through a private channel listed on their GitHub profile.
Include:
- Description and impact
- Steps to reproduce
- Affected version / commit
- Optional patch or mitigation ideas
We aim to acknowledge within a few days; timelines depend on maintainer availability.
- Remote code execution, unsafe IPC, or unsafe
shell.openExternalusage - WebRTC / preload bridge weaknesses that break
contextIsolationassumptions - Packaging / auto-update integrity (when implemented)
- Physical access to the machine, or malware already running as the user
- Social engineering on the local network
- Denial-of-service by flooding open ports on a hostile LAN (document hardening separately)
- Run BLIP only on networks you trust.
- Keep the app updated once releases publish security fixes.
- Use OS firewall policies if you expose unusual port overrides.