You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Remove strict hash verification for continuous runtime releases (will break on updates)
- Add detailed note explaining the limitation and suggesting alternatives (GPG, versioned releases)
- Simplify error messages in hash verification scripts (remove unnecessary awk)
- Document scan-build and -fanalyzer as future static analysis enhancements
- Add note about CI testing requirement for sanitizers to be effective
- Update SECURITY.md with all clarifications
Co-authored-by: probonopd <2480569+probonopd@users.noreply.github.com>
Copy file name to clipboardExpand all lines: SECURITY.md
+29-10Lines changed: 29 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,29 +13,42 @@ The project is built with comprehensive compiler warnings enabled to catch poten
13
13
14
14
These flags help ensure code quality and catch potential security issues at compile time.
15
15
16
+
### Future Enhancements
17
+
18
+
Additional static analysis tools that could be integrated:
19
+
-**scan-build** (Clang Static Analyzer): Performs code flow analysis to detect issues like null pointer dereferences and use-after-free
20
+
-**gcc -fanalyzer**: GCC's built-in static analyzer for similar code flow analysis
21
+
16
22
## Download Verification
17
23
18
-
All external dependencies downloaded during the build process are verified using SHA256 hashes:
24
+
External dependencies downloaded during the build process are verified where practical:
19
25
20
26
### Runtime Binaries
21
27
22
-
The AppImage runtime binaries are downloaded from https://github.com/AppImage/type2-runtime/releases and verified with SHA256 hashes for each architecture:
28
+
**Important Note**: The AppImage runtime binaries are downloaded from the `continuous` release at https://github.com/AppImage/type2-runtime/releases.
29
+
30
+
**Current Limitation**: Hash verification for continuous releases is problematic because:
31
+
- Continuous releases are updated regularly
32
+
- Hard-coded hashes would break when type2-runtime is updated
**Current Approach**: The build process prints the SHA256 hash and size of the downloaded runtime for transparency and audit purposes, but does not enforce hash verification.
28
36
29
-
The build process prints the hash and size of the downloaded runtime for transparency.
37
+
**Recommended Future Improvements**:
38
+
1. Use GPG signature verification (download `.sig` files and verify with GPG)
39
+
2. Switch to versioned/tagged releases instead of continuous
40
+
3. Implement automatic hash updates when type2-runtime changes
30
41
31
42
### Build Tools
32
43
33
-
External build tools are also verified:
44
+
External build tools use strict hash verification:
0 commit comments