We actively support the following versions of CrashLens with security updates:
Version | Supported |
---|---|
1.x.x | ✅ Yes |
0.x.x |
We take security vulnerabilities seriously. If you discover a security issue in CrashLens, please follow these steps:
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please:
- Email us directly at: [your-security-email@domain.com]
- Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (if you have them)
- Your contact information for follow-up
When reporting a security vulnerability, please provide:
- CrashLens version affected
- Operating system and Python version
- Detailed description of the vulnerability
- Proof of concept or steps to reproduce
- Potential impact (data exposure, code execution, etc.)
- Suggested mitigation (if any)
We are committed to responding to security reports promptly:
- 24 hours: Initial acknowledgment of your report
- 72 hours: Initial assessment and severity classification
- 7 days: Detailed response with our action plan
- 30 days: Resolution timeline (may vary based on complexity)
We believe in recognizing security researchers who help keep CrashLens secure:
- Acknowledgment: With your permission, we'll acknowledge your contribution in our security advisories
- Credits: Listed in our Hall of Fame for responsible disclosure
- Collaboration: We may invite you to help verify our fixes
When using CrashLens:
- Keep updated: Always use the latest version
- Secure logs: Ensure your log files don't contain sensitive data
- Access control: Limit who can access CrashLens reports
- Environment isolation: Run in secure, isolated environments
- Code review: All code changes require review
- Dependencies: Keep dependencies updated and secure
- Secrets: Never commit API keys, tokens, or passwords
- Input validation: Validate all user inputs and file contents
CrashLens includes several security features:
- PII Scrubbing: Automatic removal of personally identifiable information
- Local Processing: All analysis runs locally - no data leaves your system
- Input Validation: Robust parsing and validation of log files
- Safe Defaults: Secure default configurations
- Log File Contents: CrashLens processes log files that may contain sensitive information
- File System Access: CrashLens reads files from the local file system
- Output Files: Generated reports may contain traces and patterns from your data
Our vulnerability disclosure follows these principles:
- Coordinated Disclosure: We work with reporters to ensure responsible timing
- Transparency: We publish security advisories for confirmed vulnerabilities
- User Protection: We prioritize user safety over public disclosure timelines
- Learning: We use incidents to improve our security practices
For security-related questions or concerns:
- Security Email: [your-security-email@domain.com]
- GPG Key: [Link to public GPG key if available]
- Response Time: We aim to respond within 24 hours
- Never commit secrets. Use CI secret stores (GitHub Actions secrets) and environment variables.
- Slack webhooks: pass via
CRASHLENS_SLACK_WEBHOOK
.
- Reporters should default to redacting content in summary contexts.
- Prefer summary-only outputs in CI unless explicitly configured otherwise.
- Keep tests offline. No external calls in unit tests.
- Roadmap: introduce
--deny-network
flag to prevent network access during CLI runs; CI templates will enable this by default once available.
This security policy may be updated periodically. Please check back regularly for the latest information.
Last updated: September 6, 2025