| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ✅ |
If you discover a security vulnerability in Muxide, please report it responsibly.
DO NOT open a public GitHub issue for security vulnerabilities.
Instead, please email: michaelallenkuykendall@gmail.com
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 7 days
- Resolution timeline: Depends on severity, typically 30-90 days
Security issues we care about:
- Memory safety issues (buffer overflows, use-after-free)
- Malformed input causing crashes or hangs
- Resource exhaustion (memory, CPU)
- Output files that could exploit media players
- Denial of service via extremely large files (expected behavior)
- Issues in dev-dependencies (proptest, lazy_static)
- Theoretical issues without practical exploit
Muxide is designed with security in mind:
- Pure Rust - Memory safety enforced by Rust’s guarantees
- Minimal runtime dependencies - Limited third-party runtime dependency supply chain
- No unsafe code - All code is safe Rust
- Input validation - All inputs are validated before processing
- Bounded operations - Avoids unbounded allocations from user input where practical
We thank security researchers who help keep Muxide safe. Contributors will be acknowledged here (with permission).