| Version | Supported |
|---|---|
| 0.1.x | Yes |
If you discover a security vulnerability in token-privilege, please report it responsibly through one of the following channels:
- GitHub Private Vulnerability Reporting: Report here
- Email: security@evilbitlabs.io
Please do NOT open a public issue for security vulnerabilities.
Include the following in your report:
- A description of the vulnerability and its potential impact.
- Steps to reproduce or a proof-of-concept.
- The version(s) affected.
- Any suggested fix, if you have one.
The following are considered in-scope for security reports:
- Unsound unsafe code -- any
unsafeblock inffi.rsthat violates Rust safety invariants or causes undefined behavior. - Privilege escalation bugs -- any code path that could enable, disable, or modify privileges (the crate is strictly read-only by design).
- Information leaks via error messages -- error variants or messages that expose sensitive system state to unprivileged callers.
The following are NOT considered vulnerabilities in this project:
- Windows kernel bugs -- issues in the Windows kernel or Win32 API itself.
- Physical access attacks -- scenarios requiring physical access to the machine.
- Upstream
windowscrate issues -- bugs in thewindowscrate should be reported to microsoft/windows-rs. - Denial of service via expected API failures -- the crate returns
Resulterrors for all failure cases by design.
| Stage | Target |
|---|---|
| Acknowledge | 1 week |
| Assess | 2 weeks |
| Fix released | 90 days |
We will coordinate with you on disclosure timing. If a fix requires longer than 90 days, we will communicate the revised timeline.
token-privilege incorporates the following security measures:
- Isolated unsafe boundary -- all
unsafeWin32 FFI is confined to a single internal module (ffi.rs) that is not publicly exported. - Strict linting --
undocumented_unsafe_blocks = "deny",clippy::unwrap_used = "deny", andclippy::panic = "deny"are enforced crate-wide. - Read-only queries -- the crate never enables, disables, or removes privileges. It only reads token state.
- RAII handle management -- Win32
HANDLEvalues are wrapped in a type that callsCloseHandleonDrop, preventing handle leaks. - Dependency auditing --
cargo-auditandcargo-denyare run in CI to detect known vulnerabilities in dependencies.
We consider security research conducted in good faith to be authorized. We will not pursue legal action against researchers who:
- Make a good-faith effort to avoid privacy violations, data destruction, and service disruption.
- Report vulnerabilities through the channels listed above.
- Allow reasonable time for the issue to be resolved before public disclosure.
We ask that you do not access or modify other users' data, and that you only interact with accounts you own or have explicit permission to test.