We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 2.x.x | ✅ |
| 1.x.x | ❌ |
The Task Manager CLI team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
-
GitHub Security Advisories (Preferred)
- Go to the Security tab
- Click on "Report a vulnerability"
- Provide detailed information about the vulnerability
-
Email
- Send an email to [email protected]
- Include the word "SECURITY" in the subject line
- Encrypt your message using our PGP key (if available)
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Initial Response: Within 48 hours of receiving your report
- Status Update: Within 7 days with an assessment and tentative fix timeline
- Resolution: We aim to resolve critical security issues within 30 days
- Security issues are kept confidential until a fix is released
- After a fix is released, we will:
- Publish a security advisory
- Credit the reporter (unless anonymity is requested)
- Update the CHANGELOG with security fix information
We support safe harbor for security researchers who:
- Make a good faith effort to avoid privacy violations, data destruction, and service interruption
- Only interact with accounts you own or with explicit permission of the account holder
- Do not exploit a security issue beyond the minimum necessary to demonstrate it
- Report vulnerabilities promptly
- Keep vulnerability details confidential until a fix is released
We will not pursue legal action against researchers who follow these guidelines.
-
File Permissions
- Ensure
tasks.jsonhas appropriate file permissions (not world-readable) - On Unix systems:
chmod 600 tasks.json
- Ensure
-
Backup Your Data
- Regularly backup your
tasks.jsonfile - Use
taskman exportto create encrypted backups if needed
- Regularly backup your
-
Sensitive Information
- Do not store passwords, API keys, or sensitive data in task descriptions
- Use tags instead of including sensitive details in descriptions
-
Container Isolation
- Run containers with least privilege
- Use read-only volumes where possible
- Don't run as root inside containers
-
Image Security
- Pull images from official sources only
- Regularly update to latest image versions
- Scan images for vulnerabilities
We regularly update dependencies to address security vulnerabilities:
- Monitor GitHub security advisories
- Run
dotnet list package --vulnerableto check for vulnerable packages - Update dependencies promptly when security fixes are available
When building from source:
- Verify the source code integrity
- Review the code for any suspicious changes
- Build in a clean environment
- Verify checksums of dependencies
-
Input Validation
- All user inputs are validated
- Arguments are sanitized before processing
- No command injection vulnerabilities
-
File Operations
- Controlled file access (fixed filename)
- No arbitrary file read/write operations
- Safe JSON deserialization with type checking
-
Dependency Security
- Minimal external dependencies
- Official Microsoft packages only (except Spectre.Console)
- Regular security audits
-
Code Quality
- Static code analysis
- Automated testing
- Code review process for all changes
- Add encryption support for sensitive task data
- Implement audit logging for all operations
- Add data integrity checks (checksums)
- Support for signing/verification of task files
- Multi-user access controls
- Rate limiting for operations
| Date | Type | Findings | Status |
|---|---|---|---|
| 2024-01-15 | Initial assessment | None | Complete |
No vulnerabilities have been disclosed at this time.
For security-related questions or concerns:
- Security Team: [email protected]
- Project Maintainer: Via GitHub issues (for non-security questions)
We would like to thank the following researchers for responsibly disclosing security issues:
Note: This security policy may be updated at any time. Please check back regularly for updates.
Last Updated: 2024-01-15