Create SECURITY.md
Browse files- SECURITY.md +112 -0
SECURITY.md
ADDED
|
@@ -0,0 +1,112 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Security Policy
|
| 2 |
+
|
| 3 |
+
## Reporting a Vulnerability
|
| 4 |
+
|
| 5 |
+
If you discover a security vulnerability in this repository, do **not** open a public issue.
|
| 6 |
+
|
| 7 |
+
Use one of the following channels instead:
|
| 8 |
+
|
| 9 |
+
1. GitHub Security Advisories
|
| 10 |
+
Go to **Security → Report a vulnerability** in this repository.
|
| 11 |
+
|
| 12 |
+
2. Direct contact
|
| 13 |
+
Email: `security@example.com`
|
| 14 |
+
|
| 15 |
+
Replace the email above with the correct security contact before production use.
|
| 16 |
+
|
| 17 |
+
## Project Scope
|
| 18 |
+
|
| 19 |
+
This repository implements a passive, drift-aware OSINT control panel.
|
| 20 |
+
|
| 21 |
+
The system is designed around the following control path:
|
| 22 |
+
|
| 23 |
+
```text
|
| 24 |
+
Validation → Policy → Execution → Drift → Audit
|
| 25 |
+
```
|
| 26 |
+
|
| 27 |
+
The default operating mode is passive. Active interaction with user-provided targets must be gated by explicit authorization.
|
| 28 |
+
|
| 29 |
+
## In-Scope Vulnerabilities
|
| 30 |
+
|
| 31 |
+
High-priority reports include:
|
| 32 |
+
|
| 33 |
+
- Input validation or sanitisation bypass
|
| 34 |
+
- Raw indicator leakage before hashing
|
| 35 |
+
- `OSINT_HASH_SALT` or other secret exposure
|
| 36 |
+
- Authorization gate bypass
|
| 37 |
+
- Execution of conditional modules without approval
|
| 38 |
+
- Audit log tampering or deletion
|
| 39 |
+
- Policy mutation without out-of-band approval
|
| 40 |
+
- Drift detection manipulation that hides unsafe behavior
|
| 41 |
+
- Dependency behavior that creates structural drift or unsafe execution
|
| 42 |
+
|
| 43 |
+
Medium-priority reports include:
|
| 44 |
+
|
| 45 |
+
- Incorrect module risk classification
|
| 46 |
+
- Unsafe report generation
|
| 47 |
+
- Overly permissive source registry behavior
|
| 48 |
+
- Inconsistent correction-verb enforcement
|
| 49 |
+
- Unhandled exceptions that expose sensitive runtime details
|
| 50 |
+
|
| 51 |
+
Low-priority reports include:
|
| 52 |
+
|
| 53 |
+
- UI-only issues without security impact
|
| 54 |
+
- Non-sensitive error message quality
|
| 55 |
+
- Documentation inconsistencies
|
| 56 |
+
|
| 57 |
+
## Out of Scope
|
| 58 |
+
|
| 59 |
+
The following are not considered vulnerabilities in this repository:
|
| 60 |
+
|
| 61 |
+
- Issues in third-party OSINT services linked by the application
|
| 62 |
+
- Social engineering attacks
|
| 63 |
+
- Denial-of-service attempts
|
| 64 |
+
- Vulnerabilities requiring unauthorized access to third-party systems
|
| 65 |
+
- Reports involving active scanning or exploitation of targets not owned by the reporter
|
| 66 |
+
- Misuse of the tool by end users outside the intended authorization model
|
| 67 |
+
|
| 68 |
+
## Report Requirements
|
| 69 |
+
|
| 70 |
+
Please include:
|
| 71 |
+
|
| 72 |
+
- Summary of the issue
|
| 73 |
+
- Affected component, if known
|
| 74 |
+
- Steps to reproduce
|
| 75 |
+
- Expected behavior
|
| 76 |
+
- Actual behavior
|
| 77 |
+
- Security impact
|
| 78 |
+
- Safe proof of concept, if applicable
|
| 79 |
+
- Suggested mitigation, if known
|
| 80 |
+
|
| 81 |
+
Do not include real user data, secrets, unauthorized target data, destructive payloads, or exploit chains against third-party systems.
|
| 82 |
+
|
| 83 |
+
## Response Process
|
| 84 |
+
|
| 85 |
+
Expected response timeline:
|
| 86 |
+
|
| 87 |
+
- Acknowledgement: within 48 hours
|
| 88 |
+
- Initial triage: within 5 business days
|
| 89 |
+
- Fix plan: after validation and severity assessment
|
| 90 |
+
- Coordinated disclosure: if applicable
|
| 91 |
+
|
| 92 |
+
## Safe Harbor
|
| 93 |
+
|
| 94 |
+
Security research is welcome when performed in good faith.
|
| 95 |
+
|
| 96 |
+
You are expected to avoid privacy violations, avoid service degradation, avoid persistence or exfiltration, use only systems and data you are authorized to test, and stop testing if sensitive data is encountered.
|
| 97 |
+
|
| 98 |
+
## Security Architecture
|
| 99 |
+
|
| 100 |
+
This project treats security as a feedback circuit.
|
| 101 |
+
|
| 102 |
+
Core invariants:
|
| 103 |
+
|
| 104 |
+
```text
|
| 105 |
+
No raw indicators in audit logs.
|
| 106 |
+
No conditional modules without authorization.
|
| 107 |
+
No forbidden modules.
|
| 108 |
+
No policy mutation without out-of-band approval.
|
| 109 |
+
No correction outside the approved verbs: ADAPT, CONSTRAIN, REVERT, OBSERVE.
|
| 110 |
+
```
|
| 111 |
+
|
| 112 |
+
Reports that improve validation, policy enforcement, drift attribution, or audit integrity are especially valuable.
|