| # Security Policy |
|
|
| **Do not report security vulnerabilities through public GitHub issues.** |
|
|
| **Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.** |
|
|
| Include as much of the following information: |
|
|
| - Type of issue (e.g. improper input parsing, privilege escalation, etc.) |
| - The location of the affected source code (tag/branch/commit or direct URL) |
| - Any special configuration required to reproduce the issue |
| - The distribution affected or used to help us with reproduction of the issue |
| - Step-by-step instructions to reproduce the issue |
| - Ideally a reproduction repository |
| - Impact of the issue, including how an attacker might exploit the issue |
|
|
| We prefer to receive reports in English. |
|
|
| ## Contact |
|
|
| Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new). |
|
|
| Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app). |
|
|
| ## Threat Model |
|
|
| ### Security Assumptions |
|
|
| - The log file interpreting applications are hardened, as input is not sanitized |
| - No log events in the rust core are leaked to the frontend unless explicitly configured to output to the `TargetKind::Webview` component |
| - The log events generated in the frontend can be accessed from everywhere in the frontend |
| - There is no secret censoring inbuilt and developers need to take care of what they log in their application |
|
|
| ### Threats |
|
|
| #### Secret Leakage |
|
|
| One possible threat you need to consider when using this plugin is that secrets |
| in logs can theoretically be leaked when the application's frontend gets compromised. |
|
|
| For this threat to be possible all of the following requirements need to be fulfilled: |
|
|
| - `TargetKind::Webview` enabled OR secrets stem from frontend logs |
| - Frontend application is compromised via something like XSS (cross-site-scripting) OR logs are directly exposed |
| - Logs contain secrets or sensitive information |
|
|
| If these requirements are not met, the leakage should not be possible. |
|
|
| #### Out Of Scope |
|
|
| - Any exploits on the log viewer/file viewer accessing the logs |
|
|
| ## Best Practices |
|
|
| Do not log secrets or sensitive values in your logging and ensure that the upstream crates are not leaking such values in their logging events. |
| Ensure that logs are sanitized or trusted before opening them with third party tools. |
|
|