We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security seriously. If you discover a security vulnerability in Crossbar, please report it responsibly.
DO NOT open a public GitHub issue for security vulnerabilities.
Instead, please report security issues by emailing:
Or use GitHub's private vulnerability reporting:
- Go to the Security tab of the repository
- Click "Report a vulnerability"
- Fill out the form with details
Please include the following in your report:
- Description: A clear description of the vulnerability
- Impact: What an attacker could accomplish by exploiting it
- Steps to Reproduce: Detailed steps to reproduce the issue
- Affected Versions: Which versions are affected
- Possible Fix: If you have suggestions for how to fix the issue
- Your Contact: How we can reach you for follow-up questions
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Initial Assessment: We will provide an initial assessment within 7 days
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Disclosure: We will coordinate disclosure timing with you
- Confirmation: We'll confirm we received your report
- Communication: We'll keep you updated on our progress
- Credit: With your permission, we'll credit you in the security advisory
- No Legal Action: We will not pursue legal action against researchers who follow responsible disclosure
Crossbar executes plugins as scripts with the same permissions as the running user. This is a known design decision for flexibility, but users should be aware:
- Only run trusted plugins: Plugins can execute arbitrary code
- Review third-party plugins: Check the source code before installing
- Be cautious with marketplace plugins: Verify the author and reviews
Sensitive configuration values (type password) are stored using platform-specific secure storage:
| Platform | Storage Method |
|---|---|
| Linux | libsecret (GNOME Keyring, KWallet) |
| macOS | Keychain |
| Windows | Credential Manager |
- All HTTP requests from plugins use HTTPS by default
- The IPC server only listens on
localhost:48291(not accessible remotely) - No data is sent to external servers by Crossbar itself
- Plugin files should have restricted permissions (
chmod 700or750) - Configuration files may contain sensitive data (API keys)
- Crossbar respects file system permissions
The following are known security considerations, not vulnerabilities:
- No Plugin Sandboxing: Plugins run with full user permissions
- No Plugin Signing: Plugins are not cryptographically signed
- No Plugin Verification: Marketplace plugins are not reviewed for security
- Local IPC Server: The IPC server is accessible to local processes
These are documented trade-offs for the initial release. Future versions may address these through optional security enhancements.
- Keep Crossbar updated: Install security updates promptly
- Review plugin source code: Especially for third-party plugins
- Use secure API keys: Don't share keys across services
- Limit plugin permissions: If possible, run sensitive plugins with reduced privileges
- Monitor plugin behavior: Check logs for unexpected activity
- Validate all inputs: Never trust user input or external data
- Use HTTPS: Always use secure connections for network requests
- Don't hardcode secrets: Use configuration files for API keys
- Handle errors gracefully: Don't expose sensitive information in error messages
- Minimize dependencies: Fewer dependencies = smaller attack surface
- Document security requirements: Let users know what permissions your plugin needs
We appreciate the security community's efforts in responsibly disclosing vulnerabilities. Contributors who report valid security issues will be acknowledged in our security advisories (with their permission).
For security concerns: [email protected]
For general questions: GitHub Discussions
For bug reports: GitHub Issues