| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security seriously. If you discover a security vulnerability, please report it responsibly.
- DO NOT open a public issue
- Email security concerns to: [security@openflash.dev] (or create a private security advisory on GitHub)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Resolution Timeline: Depends on severity
- Critical: 24-72 hours
- High: 1-2 weeks
- Medium: 2-4 weeks
- Low: Next release
Security issues we're interested in:
- Desktop App: Code execution, privilege escalation, data leaks
- USB Protocol: Buffer overflows, injection attacks
- Firmware: Memory corruption, unauthorized access
- Dependencies: Vulnerable third-party libraries
- Physical attacks requiring hardware access
- Social engineering
- Denial of service (unless severe)
- Issues in unsupported versions
Security researchers who responsibly disclose vulnerabilities will be:
- Credited in release notes (unless anonymity requested)
- Added to our Security Hall of Fame
- Eligible for swag (stickers, t-shirts)
- Download from official sources only (GitHub Releases)
- Verify checksums of downloaded binaries
- Keep software updated to latest version
- Use trusted USB devices - malicious firmware could compromise your system
- Backup important data before flash operations
The firmware runs on microcontrollers with direct hardware access. While we implement safety checks:
- Always verify chip detection before operations
- Use write-protect features when available
- Never flash unknown firmware to production devices
Thank you for helping keep OpenFlash secure! 🔒