Skip to content

Latest commit

 

History

History
55 lines (35 loc) · 2.58 KB

SECURITY.md

File metadata and controls

55 lines (35 loc) · 2.58 KB

Security Policy

Do not report security vulnerabilities through public GitHub issues.

Please use the Private Vulnerability Disclosure feature of GitHub.

Include as much of the following information:

  • Type of issue (e.g. improper input parsing, privilege escalation, etc.)
  • The location of the affected source code (tag/branch/commit or direct URL)
  • Any special configuration required to reproduce the issue
  • The distribution affected or used to help us with reproduction of the issue
  • Step-by-step instructions to reproduce the issue
  • Ideally a reproduction repository
  • Impact of the issue, including how an attacker might exploit the issue

We prefer to receive reports in English.

Contact

Please disclose a vulnerability or security relevant issue here: https://github.com/tauri-apps/plugins-workspace/security/advisories/new.

Alternatively, you can also contact us by email via [email protected].

Threat Model

Security Assumptions

  • The log file interpreting applications are hardened, as input is not sanitized
  • No log events in the rust core are leaked to the frontend unless explicitly configured to output to the TargetKind::Webview component
  • The log events generated in the frontend can be accessed from everywhere in the frontend
  • There is no secret censoring inbuilt and developers need to take care of what they log in their application

Threats

Secret Leakage

One possible threat you need to consider when using this plugin is that secrets in logs can theoretically be leaked when the application's frontend gets compromised.

For this threat to be possible all of the following requirements need to be fulfilled:

  • TargetKind::Webview enabled OR secrets stem from frontend logs
  • Frontend application is compromised via something like XSS (cross-site-scripting) OR logs are directly exposed
  • Logs contain secrets or sensitive information

If these requirements are not met, the leakage should not be possible.

Out Of Scope

  • Any exploits on the log viewer/file viewer accessing the logs

Best Practices

Do not log secrets or sensitive values in your logging and ensure that the upstream crates are not leaking such values in their logging events. Ensure that logs are sanitized or trusted before opening them with third party tools.