We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
The Open Threat Detector team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings.
- **Create an Issue with Security tag
- Provide detailed information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if you have one)
- Your contact information for follow-up
- Do NOT open a public GitHub issue for security vulnerabilities
- Do NOT disclose the vulnerability publicly until we've had a chance to address it
- Do NOT exploit the vulnerability beyond what is necessary to demonstrate it
- Initial Response: Within 48 hours of report
- Status Update: Within 7 days with assessment
- Fix Timeline: Varies based on severity and complexity
- Disclosure: After fix is released and deployed
Our detection scripts follow these security principles:
-
Read-Only Operations
- Scripts NEVER modify system files
- Scripts NEVER delete or alter configurations
- Scripts ONLY detect and report
-
No Data Transmission
- Scripts don't send data externally
- All processing happens locally
- No telemetry or analytics collected
-
Minimal Privileges
- Most checks run with standard user permissions
- Elevated privileges optional for system-wide checks
- No requirement for admin/root access for core functionality
-
No Code Execution
- Scripts don't execute untrusted code
- No dynamic code generation
- No eval or similar dangerous constructs
-
Input Validation
- All inputs validated
- Path traversal protections
- Command injection protections
When deploying detection scripts:
-
Review Scripts Before Deployment
- Audit the code yourself
- Understand what each script does
- Verify no modifications to trusted sources
-
Test in Isolated Environment
- Test on non-production systems first
- Verify behavior matches documentation
- Check for unexpected side effects
-
Use Version Control
- Deploy specific tagged versions
- Track what version is deployed where
- Don't use scripts from arbitrary commits
-
Monitor Execution
- Log script executions
- Alert on unexpected failures
- Review reports regularly
When integrating with MDM/EDR platforms:
-
Use Platform Security Features
- Enable script signing (if available)
- Use secure credential storage
- Leverage platform RBAC
-
Restrict Access
- Limit who can modify deployment configs
- Audit changes to scripts and schedules
- Use principle of least privilege
-
Secure Reporting
- Encrypt reports in transit
- Restrict access to compliance data
- Comply with data retention policies
- Scripts may detect legitimate installations
- Organizations should have approved software lists
- Detection doesn't imply malicious intent
- Novel installation methods may evade detection
- Scripts rely on known patterns
- Regular updates needed to catch new techniques
- Scripts detect software presence, not usage
- No user data or file contents collected
- Execution logs may contain user paths
- Some checks may require elevated privileges
- Document permission requirements clearly
- Provide alternatives for restricted environments
- Vulnerabilities in detection scripts
- Security issues in documentation
- MDM integration security concerns
- Privacy violations
- Data leakage issues
- Theoretical vulnerabilities without proof of concept
- Social engineering attacks
- Denial of service via excessive script execution
- Issues in third-party MDM/EDR platforms
- Vulnerabilities in detected software itself
We support safe harbor for security researchers who:
- Make a good faith effort to avoid privacy violations, data destruction, and service interruption
- Do not exploit vulnerabilities beyond minimal necessary testing
- Give us reasonable time to respond before disclosure
- Do not access or modify others' data without authorization
- Security patches will be released as soon as possible
- Security advisories will be published on GitHub
- CVEs will be requested for significant vulnerabilities
- Credit given to researchers (unless anonymity requested)
When contributing code:
-
Never Hardcode Secrets
- No API keys, passwords, or tokens
- Use environment variables or config files
- Don't commit
.envfiles
-
Validate All Inputs
- Check file paths for traversal
- Validate command arguments
- Sanitize user inputs
-
Use Safe APIs
- Avoid shell injection vectors
- Use parameterized commands
- Prefer language-native APIs
-
Error Handling
- Don't expose sensitive info in errors
- Log securely
- Fail safely
-
Dependencies
- Keep dependencies minimal
- Use well-maintained packages
- Review dependency security advisories
This project aims to comply with:
- OWASP Top 10: Address common security risks
- CWE Top 25: Mitigate dangerous software weaknesses
- NIST Guidelines: Follow security best practices
- Secure Coding Standards: Industry-standard secure development
Subscribe to security updates:
- Watch this repository for security advisories
- Check releases for security patches
- Follow project announcements
For non-security questions, use:
- GitHub Issues for bugs
- GitHub Discussions for questions
- Email for security concerns only
Thank you for helping keep Open Threat Detector secure!