Skip to content

Commit 90198da

Browse files
authored
Add a trust boundary section (#4716)
Signed-off-by: Josh Bressers <josh@bress.net>
1 parent d71b747 commit 90198da

File tree

1 file changed

+20
-0
lines changed

1 file changed

+20
-0
lines changed

SECURITY.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,3 +14,23 @@ affected versions, and, if known, mitigations for the issue.
1414
All support will be made on a best effort basis, so please indicate the "urgency level" of the vulnerability as Critical, High, Medium or Low.
1515

1616
For more details, see our [security policy documentation](https://oss.anchore.com/docs/contributing/security/).
17+
18+
## Trust Boundary
19+
20+
Syft is a tool to scan content and product an SBOM. Syft is not a tool designed to scan malicious content. Detecting and properly reporting on purposely malicious artifacts is outside the scope of Syft's expected operating environment.
21+
22+
There are many possible ways for malicious content to cause Syft to become confused or fail to include results in an SBOM. We do not consider this to be a security vulnerability.
23+
24+
**Examples**
25+
- Removing or altering a package lock file
26+
- Removing or altering an RPM or DEB database
27+
- A malicious archive that Syft will skip but the runtime may not
28+
- Self modifying systems that change state when running
29+
30+
We consider the security trust boundary for Syft to be anything that causes problems for the overall system running Syft, or Syft operating in a way that is dangerous to itself, the system, or the operator.
31+
32+
**Examples**
33+
- Filling up temp space permanently
34+
- Syft executing arbitrary code when scanning an artifact
35+
- Syft leaking secrets from the environment or configuration files into logs or SBOMs
36+
- Syft operating outside of the expected artifact or directory (directory traversal)

0 commit comments

Comments
 (0)