This project is in active early development. The latest main branch is the only
supported version for security fixes at this time.
If you discover a security vulnerability, please report it privately.
Include:
- A clear description of the issue
- Affected files/components
- Reproduction steps or proof of concept
- Potential impact
- Suggested remediation (if known)
Please do not disclose vulnerabilities publicly until a fix is available.
- Acknowledgement target: within 5 business days
- Triage and impact assessment
- Fix development and validation
- Coordinated disclosure after patch release
Given ExtBridge manages local filesystem links and provides a Desktop GUI, key review areas include:
- Symlink/junction target validation
- Path traversal prevention
- Unsafe delete or overwrite operations
- Privilege-sensitive behavior on Windows junctions
- Registry integrity and tamper handling
- Context Isolation & Node Integration: The GUI must use preload scripts with context isolation enabled.
nodeIntegrationmust be strictly disabled for the renderer process. - IPC Validation: All IPC communication between the Renderer (React) and the Main Process (Node.js) should be strictly typed and sanitized.
- XSS Prevention: Ensure user input and paths are properly escaped in the React renderer.
- Use
extbridge init --dry-runbefore first-time migrations on important environments. - Keep backups of IDE extension directories before large migrations.
- Run
extbridge doctorto verify system integrity.