The following versions of warcraft-rs
are currently being supported with
security updates:
Version | Supported |
---|---|
0.1.x | ✅ |
< 0.1 | ❌ |
We take the security of warcraft-rs
seriously. If you believe you have found a
security vulnerability, please report it to us as described below.
- Open a public issue on GitHub
- Discuss the vulnerability in public forums
- Exploit the vulnerability beyond what is necessary to demonstrate it
-
Email us directly at: [email protected]
- Use the subject line:
[SECURITY] warcraft-rs - Brief Description
- Include "warcraft-rs Security" in the subject line
- Use the subject line:
-
Include the following information:
- Type of vulnerability (e.g., buffer overflow, path traversal, etc.)
- Affected component(s) and version(s)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact assessment and potential attack scenarios
- Any suggested fixes or mitigations
-
Use GPG encryption (optional but recommended):
- Our GPG key can be requested via email
- This ensures confidential communication
- Initial Response: Within 48 hours, we will acknowledge receipt of your report
- Assessment: Within 7 days, we will provide an initial assessment and expected timeline
- Resolution: We aim to resolve critical issues within 30 days, depending on complexity
- Acknowledgment: You'll receive confirmation that we've received your report
- Communication: We'll keep you informed about our progress
- Credit: With your permission, we'll acknowledge your contribution when the issue is resolved
- Disclosure: We'll work with you to establish an appropriate disclosure timeline
While warcraft-rs
handles data files from World of Warcraft, security
considerations include:
-
Malformed Files: Crafted files could potentially cause:
- Buffer overflows
- Excessive memory allocation
- Infinite loops
- Integer overflows
-
Path Traversal: When loading listfiles or files:
- Validate all file paths
- Prevent directory traversal attacks
-
Resource Exhaustion: Large or crafted files could cause:
- Memory exhaustion
- CPU exhaustion through algorithmic complexity
- Input validation on all file operations
- Bounds checking on all array accesses
- Safe string handling using Rust's memory safety
- Limited recursion depth for complex operations
- Resource limits for memory allocation
Currently, we do not offer a bug bounty program. However, we greatly appreciate security researchers who responsibly disclose vulnerabilities and will acknowledge their contributions.
Security updates will be released as patch versions (e.g., 0.1.1, 0.1.2) and announced through:
- GitHub Security Advisories
- Release notes
- The CHANGELOG.md file
Thank you for helping keep warcraft-rs
and its users safe!