S-Dreamer commited on
Commit
b429fc8
·
verified ·
1 Parent(s): d15a00d

Create SECURITY.md

Browse files
Files changed (1) hide show
  1. SECURITY.md +112 -0
SECURITY.md ADDED
@@ -0,0 +1,112 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Security Policy
2
+
3
+ ## Reporting a Vulnerability
4
+
5
+ If you discover a security vulnerability in this repository, do **not** open a public issue.
6
+
7
+ Use one of the following channels instead:
8
+
9
+ 1. GitHub Security Advisories
10
+ Go to **Security → Report a vulnerability** in this repository.
11
+
12
+ 2. Direct contact
13
+ Email: `security@example.com`
14
+
15
+ Replace the email above with the correct security contact before production use.
16
+
17
+ ## Project Scope
18
+
19
+ This repository implements a passive, drift-aware OSINT control panel.
20
+
21
+ The system is designed around the following control path:
22
+
23
+ ```text
24
+ Validation → Policy → Execution → Drift → Audit
25
+ ```
26
+
27
+ The default operating mode is passive. Active interaction with user-provided targets must be gated by explicit authorization.
28
+
29
+ ## In-Scope Vulnerabilities
30
+
31
+ High-priority reports include:
32
+
33
+ - Input validation or sanitisation bypass
34
+ - Raw indicator leakage before hashing
35
+ - `OSINT_HASH_SALT` or other secret exposure
36
+ - Authorization gate bypass
37
+ - Execution of conditional modules without approval
38
+ - Audit log tampering or deletion
39
+ - Policy mutation without out-of-band approval
40
+ - Drift detection manipulation that hides unsafe behavior
41
+ - Dependency behavior that creates structural drift or unsafe execution
42
+
43
+ Medium-priority reports include:
44
+
45
+ - Incorrect module risk classification
46
+ - Unsafe report generation
47
+ - Overly permissive source registry behavior
48
+ - Inconsistent correction-verb enforcement
49
+ - Unhandled exceptions that expose sensitive runtime details
50
+
51
+ Low-priority reports include:
52
+
53
+ - UI-only issues without security impact
54
+ - Non-sensitive error message quality
55
+ - Documentation inconsistencies
56
+
57
+ ## Out of Scope
58
+
59
+ The following are not considered vulnerabilities in this repository:
60
+
61
+ - Issues in third-party OSINT services linked by the application
62
+ - Social engineering attacks
63
+ - Denial-of-service attempts
64
+ - Vulnerabilities requiring unauthorized access to third-party systems
65
+ - Reports involving active scanning or exploitation of targets not owned by the reporter
66
+ - Misuse of the tool by end users outside the intended authorization model
67
+
68
+ ## Report Requirements
69
+
70
+ Please include:
71
+
72
+ - Summary of the issue
73
+ - Affected component, if known
74
+ - Steps to reproduce
75
+ - Expected behavior
76
+ - Actual behavior
77
+ - Security impact
78
+ - Safe proof of concept, if applicable
79
+ - Suggested mitigation, if known
80
+
81
+ Do not include real user data, secrets, unauthorized target data, destructive payloads, or exploit chains against third-party systems.
82
+
83
+ ## Response Process
84
+
85
+ Expected response timeline:
86
+
87
+ - Acknowledgement: within 48 hours
88
+ - Initial triage: within 5 business days
89
+ - Fix plan: after validation and severity assessment
90
+ - Coordinated disclosure: if applicable
91
+
92
+ ## Safe Harbor
93
+
94
+ Security research is welcome when performed in good faith.
95
+
96
+ You are expected to avoid privacy violations, avoid service degradation, avoid persistence or exfiltration, use only systems and data you are authorized to test, and stop testing if sensitive data is encountered.
97
+
98
+ ## Security Architecture
99
+
100
+ This project treats security as a feedback circuit.
101
+
102
+ Core invariants:
103
+
104
+ ```text
105
+ No raw indicators in audit logs.
106
+ No conditional modules without authorization.
107
+ No forbidden modules.
108
+ No policy mutation without out-of-band approval.
109
+ No correction outside the approved verbs: ADAPT, CONSTRAIN, REVERT, OBSERVE.
110
+ ```
111
+
112
+ Reports that improve validation, policy enforcement, drift attribution, or audit integrity are especially valuable.