mirror of
https://github.com/tauri-apps/plugins-workspace.git
synced 2026-01-31 00:45:24 +01:00
* chore: adjust prettier config, .gitignore and use taplo to format toml files This brings the plugins-workspace repository to the same code style of the main tauri repo * format toml * ignore examples gen dir * add .vscode/extensions.json * remove packageManager field * fmt * fix audit * taplo ignore permissions autogenerated files * remove create dummy dist * fix prettier workflow * install fmt in prettier workflow --------- Co-authored-by: Lucas Nogueira <lucas@tauri.app>
57 lines
2.6 KiB
Markdown
57 lines
2.6 KiB
Markdown
# Security Policy
|
|
|
|
**Do not report security vulnerabilities through public GitHub issues.**
|
|
|
|
**Please use the [Private Vulnerability Disclosure](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability#privately-reporting-a-security-vulnerability) feature of GitHub.**
|
|
|
|
Include as much of the following information:
|
|
|
|
- Type of issue (e.g. improper input parsing, privilege escalation, etc.)
|
|
- The location of the affected source code (tag/branch/commit or direct URL)
|
|
- Any special configuration required to reproduce the issue
|
|
- The distribution affected or used to help us with reproduction of the issue
|
|
- Step-by-step instructions to reproduce the issue
|
|
- Ideally a reproduction repository
|
|
- Impact of the issue, including how an attacker might exploit the issue
|
|
|
|
We prefer to receive reports in English.
|
|
|
|
## Contact
|
|
|
|
Please disclose a vulnerability or security relevant issue here: [https://github.com/tauri-apps/plugins-workspace/security/advisories/new](https://github.com/tauri-apps/plugins-workspace/security/advisories/new).
|
|
|
|
Alternatively, you can also contact us by email via [security@tauri.app](mailto:security@tauri.app).
|
|
|
|
## Threat Model
|
|
|
|
### Security Assumptions
|
|
|
|
- The log file interpreting applications are hardened, as input is not sanitized
|
|
- No log events in the rust core are leaked to the frontend unless explicitly configured to output to the `TargetKind::Webview` component
|
|
- The log events generated in the frontend can be accessed from everywhere in the frontend
|
|
- There is no secret censoring inbuilt and developers need to take care of what they log in their application
|
|
|
|
### Threats
|
|
|
|
#### Secret Leakage
|
|
|
|
One possible threat you need to consider when using this plugin is that secrets
|
|
in logs can theoretically be leaked when the application's frontend gets compromised.
|
|
|
|
For this threat to be possible all of the following requirements need to be fulfilled:
|
|
|
|
- `TargetKind::Webview` enabled OR secrets stem from frontend logs
|
|
- Frontend application is compromised via something like XSS (cross-site-scripting) OR logs are directly exposed
|
|
- Logs contain secrets or sensitive information
|
|
|
|
If these requirements are not met, the leakage should not be possible.
|
|
|
|
#### Out Of Scope
|
|
|
|
- Any exploits on the log viewer/file viewer accessing the logs
|
|
|
|
## Best Practices
|
|
|
|
Do not log secrets or sensitive values in your logging and ensure that the upstream crates are not leaking such values in their logging events.
|
|
Ensure that logs are sanitized or trusted before opening them with third party tools.
|