File size: 6,343 Bytes
b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 b429fc8 9cb16b8 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 | # Security Policy
## Reporting a Vulnerability
If you believe you have discovered a security vulnerability in this repository, please do **not** open a public issue, discussion, or pull request describing the vulnerability.
Use a private reporting channel instead:
1. **GitHub Private Vulnerability Reporting**
Go to **Security β Report a vulnerability** in this repository, if available.
2. **Direct security contact**
Email: `security@yourdomain.com`
Replace the email address above with the correct production security contact before publishing this repository.
## Project Scope
This repository implements a passive, drift-aware OSINT control panel.
The system is designed around the following control path:
```text
Validation β Policy β Execution β Drift β Audit
````
The default operating mode is passive. Any active interaction with a user-provided target must be explicitly authorized before execution.
Security reports are most valuable when they help strengthen validation, authorization, policy enforcement, drift detection, audit integrity, or safe handling of indicators.
## Security Model
The project is built around the following invariants:
```text
No raw indicators in audit logs.
No conditional modules without explicit authorization.
No forbidden modules.
No policy mutation without out-of-band approval.
No correction outside the approved verbs: ADAPT, CONSTRAIN, REVERT, OBSERVE.
```
The intended trust boundary is:
```text
User Input β Validation β Policy Decision β Approved Execution β Drift Check β Audit Record
```
Any bypass, mutation, or unsafe shortcut in this chain may be security-relevant.
## In-Scope Vulnerabilities
High-priority reports include:
* Input validation or sanitization bypass
* Raw indicator leakage before hashing or redaction
* Exposure of `OSINT_HASH_SALT` or other secrets
* Authorization gate bypass
* Execution of conditional modules without approval
* Audit log tampering, deletion, or suppression
* Policy mutation without out-of-band approval
* Drift detection manipulation that hides unsafe behavior
* Introduction of forbidden modules or active tooling
* Dependency behavior that causes unsafe execution or structural drift
Medium-priority reports include:
* Incorrect module risk classification
* Unsafe report generation
* Overly permissive source registry behavior
* Inconsistent correction-verb enforcement
* Unhandled exceptions that expose sensitive runtime details
* Incomplete audit records for security-relevant actions
* Configuration behavior that weakens passive-first guarantees
Low-priority reports include:
* UI-only issues without security impact
* Non-sensitive error message quality
* Documentation inconsistencies
* Minor logging or formatting issues that do not affect audit integrity
## Out of Scope
The following are not considered vulnerabilities in this repository:
* Issues in third-party OSINT services linked by the application
* Social engineering attacks
* Denial-of-service attempts
* Physical attacks
* Spam or phishing reports unrelated to this codebase
* Vulnerabilities requiring unauthorized access to third-party systems
* Reports involving active scanning or exploitation of targets not owned or explicitly controlled by the reporter
* Misuse of the tool by end users outside the intended authorization model
* Findings based only on hypothetical impact without a realistic path to exploitation
## Testing Rules
Security testing must be safe, authorized, and non-destructive.
Do not:
* Use real user data
* Submit secrets, credentials, or unauthorized target data
* Perform active scanning against third-party systems
* Attempt persistence, privilege escalation, or data exfiltration
* Degrade service availability
* Run destructive payloads
* Chain exploits against systems outside your authorization scope
If sensitive data is encountered during testing, stop immediately and report the exposure through a private channel.
## Report Requirements
Please include as much of the following as possible:
* Summary of the issue
* Affected component, file, or control path
* Steps to reproduce
* Expected behavior
* Actual behavior
* Security impact
* Safe proof of concept, if applicable
* Suggested mitigation, if known
* Whether the issue affects validation, policy, execution, drift detection, or audit integrity
Please avoid including real user data, live secrets, unauthorized target data, destructive payloads, or exploit chains against third-party systems.
## Response Process
Expected response timeline:
* **Acknowledgement:** within 48 hours
* **Initial triage:** within 5 business days
* **Severity assessment:** after reproduction and impact review
* **Fix plan:** after validation of the issue
* **Coordinated disclosure:** when applicable
Timelines may vary depending on complexity, severity, and maintainer availability.
## Coordinated Disclosure
Please give the maintainers reasonable time to investigate and remediate confirmed vulnerabilities before public disclosure.
If a vulnerability affects users, deployment safety, secrets, or audit integrity, coordinated disclosure may include:
* Patch development
* Regression tests
* Security advisory publication
* Versioned release notes
* Mitigation guidance
## Safe Harbor
Good-faith security research is welcome when it follows this policy.
The project will not pursue action against researchers who:
* Act in good faith
* Stay within authorized scope
* Avoid privacy violations
* Avoid service degradation
* Avoid persistence or exfiltration
* Report vulnerabilities promptly and privately
* Stop testing if sensitive data is encountered
Safe harbor does not apply to activity that targets third-party systems without authorization, uses destructive techniques, or attempts to access, retain, or disclose data that does not belong to the researcher.
## Preferred Areas of Review
Reports are especially useful when they improve:
* Indicator validation
* Hashing and redaction behavior
* Authorization gating
* Passive-first enforcement
* Conditional module controls
* Source registry constraints
* Drift attribution
* Audit log integrity
* Policy mutation safeguards
* Dependency and supply-chain safety
## Security Contact
Primary security contact:
```text
distortedprojection@gmail.com
```
```
```
|