We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability, please follow these steps:
Security vulnerabilities should be reported privately to avoid potential harm to users.
Please send an email to security@gofred.io with the following information:
- Subject: Security Vulnerability Report - [Brief Description]
- Description: Detailed description of the vulnerability
- Steps to reproduce: Clear steps to reproduce the issue
- Impact: Potential impact of the vulnerability
- Affected versions: Which versions are affected
- Suggested fix: If you have suggestions for fixing the issue
- Acknowledgment: You will receive an acknowledgment within 48 hours
- Initial assessment: We will provide an initial assessment within 5 business days
- Regular updates: We will keep you informed of our progress
- Resolution: We will work with you to resolve the issue
We follow responsible disclosure practices:
- We will not publicly disclose the vulnerability until it has been fixed
- We will credit you in our security advisories (unless you prefer to remain anonymous)
- We will work with you to coordinate the disclosure timeline
- Always use the latest version of Gofred CLI
- Keep your Go installation up to date
- Be cautious when downloading and running binaries
- Verify checksums when available
- Report suspicious behavior immediately
- Follow secure coding practices
- Keep dependencies up to date
- Use security scanning tools
- Implement proper input validation
- Follow the principle of least privilege
Gofred CLI implements several security features:
- Checksum verification: Downloaded binaries are verified against checksums
- Secure defaults: Sensible security defaults out of the box
- Minimal permissions: Only requests necessary permissions
- Sandboxed execution: WebAssembly provides additional isolation
- WebAssembly runs in a sandboxed environment
- Limited access to system resources
- No direct file system access (except through provided APIs)
- All network requests use HTTPS when possible
- CDN downloads are verified against checksums
- No sensitive data is transmitted in plain text
- Applications are created in user-specified directories
- No automatic execution of downloaded code
- User has full control over file permissions
Security updates are released as soon as possible after a vulnerability is discovered and fixed. Updates are announced through:
- GitHub releases
- Security advisories
- Email notifications (for critical vulnerabilities)
For security-related questions or concerns, please contact:
- Email: security@gofred.io
- GitHub: Create a private security advisory
We thank the security researchers and community members who help keep Gofred CLI secure by reporting vulnerabilities and suggesting improvements.
This security policy is provided for informational purposes only and does not create any legal obligations. We reserve the right to modify this policy at any time.