This commit is contained in:
Collin 2025-07-04 10:59:14 -07:00 committed by GitHub
commit ac46a35022
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

69
SECURITY.md Normal file
View File

@ -0,0 +1,69 @@
# X11Libre Security Policy
## Reporting Vulnerabilities
The X11Libre project takes security seriously. If you discover any vulnerabilities, please report them responsibly.
### How to Report a Security Vulnerability
Send a detailed email to one or more of the following contacts:
- info@metux.net
- legendarydood@gmail.com
Include the following information:
1. **Vulnerability description**
- What did you observe, and why is it a concern?
2. **Reproduction steps**
- Clear, step-by-step instructions
- Include specific configurations or inputs required
3. **System and environment details**
- OS version
- X11Libre version or commit hash
- Display manager, drivers, or hardware specifics
4. **Supporting data**
- Logs (in plain text)
- Core dumps (if available and safe to share)
5. **Impact analysis (if known)**
- Potential for remote or local exploitation
- Possible consequences (e.g. data exposure, privilege escalation, denial-of-service)
Please allow us ample time to validate and patch the issue before disclosing it publicly.
Feel free to privately message staff over our official Matrix or Telegram if the issue is of extreme merit and needs an immediate solution.
## Supported Versions
| Version | Status |
| --------------- | ------------------------- |
| `master` branch | Supported and maintained |
| Older tags | No longer supported |
We recommend always using the latest release for performance and security fixes.
## Security Best Practices (User-Side)
To help protect your systems when using X11Libre:
- Use minimal privileges when running X sessions
- Avoid setuid binaries unless required
- Keep your display manager and window manager updated
- Regularly audit any X11-forwarded connections, especially over SSH
- Use sandboxing or containerization when integrating third-party extensions
## Developer Guidelines
For contributors submitting PRs:
- Dont introduce new system calls without justification
- Avoid unsafe memory operations (especially in C/C++)
- Use compile-time and runtime hardening flags
- Submit fuzzing harnesses or test vectors for complex parsing logic
---
We appreciate your help in keeping X11Libre safe for everyone. Lets build something resilient, secure, and libre.