S-Dreamer's picture
Upload 13 files
9cb16b8 verified
# Security Policy
## Reporting a Vulnerability
If you believe you have discovered a security vulnerability in this repository, please do **not** open a public issue, discussion, or pull request describing the vulnerability.
Use a private reporting channel instead:
1. **GitHub Private Vulnerability Reporting**
Go to **Security β†’ Report a vulnerability** in this repository, if available.
2. **Direct security contact**
Email: `security@yourdomain.com`
Replace the email address above with the correct production security contact before publishing this repository.
## Project Scope
This repository implements a passive, drift-aware OSINT control panel.
The system is designed around the following control path:
```text
Validation β†’ Policy β†’ Execution β†’ Drift β†’ Audit
````
The default operating mode is passive. Any active interaction with a user-provided target must be explicitly authorized before execution.
Security reports are most valuable when they help strengthen validation, authorization, policy enforcement, drift detection, audit integrity, or safe handling of indicators.
## Security Model
The project is built around the following invariants:
```text
No raw indicators in audit logs.
No conditional modules without explicit authorization.
No forbidden modules.
No policy mutation without out-of-band approval.
No correction outside the approved verbs: ADAPT, CONSTRAIN, REVERT, OBSERVE.
```
The intended trust boundary is:
```text
User Input β†’ Validation β†’ Policy Decision β†’ Approved Execution β†’ Drift Check β†’ Audit Record
```
Any bypass, mutation, or unsafe shortcut in this chain may be security-relevant.
## In-Scope Vulnerabilities
High-priority reports include:
* Input validation or sanitization bypass
* Raw indicator leakage before hashing or redaction
* Exposure of `OSINT_HASH_SALT` or other secrets
* Authorization gate bypass
* Execution of conditional modules without approval
* Audit log tampering, deletion, or suppression
* Policy mutation without out-of-band approval
* Drift detection manipulation that hides unsafe behavior
* Introduction of forbidden modules or active tooling
* Dependency behavior that causes unsafe execution or structural drift
Medium-priority reports include:
* Incorrect module risk classification
* Unsafe report generation
* Overly permissive source registry behavior
* Inconsistent correction-verb enforcement
* Unhandled exceptions that expose sensitive runtime details
* Incomplete audit records for security-relevant actions
* Configuration behavior that weakens passive-first guarantees
Low-priority reports include:
* UI-only issues without security impact
* Non-sensitive error message quality
* Documentation inconsistencies
* Minor logging or formatting issues that do not affect audit integrity
## Out of Scope
The following are not considered vulnerabilities in this repository:
* Issues in third-party OSINT services linked by the application
* Social engineering attacks
* Denial-of-service attempts
* Physical attacks
* Spam or phishing reports unrelated to this codebase
* Vulnerabilities requiring unauthorized access to third-party systems
* Reports involving active scanning or exploitation of targets not owned or explicitly controlled by the reporter
* Misuse of the tool by end users outside the intended authorization model
* Findings based only on hypothetical impact without a realistic path to exploitation
## Testing Rules
Security testing must be safe, authorized, and non-destructive.
Do not:
* Use real user data
* Submit secrets, credentials, or unauthorized target data
* Perform active scanning against third-party systems
* Attempt persistence, privilege escalation, or data exfiltration
* Degrade service availability
* Run destructive payloads
* Chain exploits against systems outside your authorization scope
If sensitive data is encountered during testing, stop immediately and report the exposure through a private channel.
## Report Requirements
Please include as much of the following as possible:
* Summary of the issue
* Affected component, file, or control path
* Steps to reproduce
* Expected behavior
* Actual behavior
* Security impact
* Safe proof of concept, if applicable
* Suggested mitigation, if known
* Whether the issue affects validation, policy, execution, drift detection, or audit integrity
Please avoid including real user data, live secrets, unauthorized target data, destructive payloads, or exploit chains against third-party systems.
## Response Process
Expected response timeline:
* **Acknowledgement:** within 48 hours
* **Initial triage:** within 5 business days
* **Severity assessment:** after reproduction and impact review
* **Fix plan:** after validation of the issue
* **Coordinated disclosure:** when applicable
Timelines may vary depending on complexity, severity, and maintainer availability.
## Coordinated Disclosure
Please give the maintainers reasonable time to investigate and remediate confirmed vulnerabilities before public disclosure.
If a vulnerability affects users, deployment safety, secrets, or audit integrity, coordinated disclosure may include:
* Patch development
* Regression tests
* Security advisory publication
* Versioned release notes
* Mitigation guidance
## Safe Harbor
Good-faith security research is welcome when it follows this policy.
The project will not pursue action against researchers who:
* Act in good faith
* Stay within authorized scope
* Avoid privacy violations
* Avoid service degradation
* Avoid persistence or exfiltration
* Report vulnerabilities promptly and privately
* Stop testing if sensitive data is encountered
Safe harbor does not apply to activity that targets third-party systems without authorization, uses destructive techniques, or attempts to access, retain, or disclose data that does not belong to the researcher.
## Preferred Areas of Review
Reports are especially useful when they improve:
* Indicator validation
* Hashing and redaction behavior
* Authorization gating
* Passive-first enforcement
* Conditional module controls
* Source registry constraints
* Drift attribution
* Audit log integrity
* Policy mutation safeguards
* Dependency and supply-chain safety
## Security Contact
Primary security contact:
```text
distortedprojection@gmail.com
```
```
```