| Version | Supported |
|---|---|
| 0.14.x | ✅ |
| 0.13.x | ✅ |
| < 0.13 | ❌ |
We take the security of RMA seriously. If you discover a security vulnerability, please report it responsibly.
- DO NOT create a public GitHub issue for security vulnerabilities
- Use GitHub's private vulnerability reporting:
- Go to Security Advisories
- Click "Report a vulnerability"
- Fill out the form with details
- Type of vulnerability (RCE, path traversal, DoS, etc.)
- Full path to the vulnerable code (if known)
- Step-by-step instructions to reproduce
- Proof of concept (if possible)
- Impact assessment
- Suggested fix (if you have one)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 24-72 hours
- High: 1-2 weeks
- Medium: 2-4 weeks
- Low: Next release
- Acknowledgment of your report
- Assessment of the vulnerability
- Development of a fix
- Coordinated disclosure (we'll credit you unless you prefer anonymity)
- Security advisory publication
- Sandboxing: Run RMA in a sandboxed environment when analyzing untrusted code
- Permissions: RMA only needs read access to source files
- CI/CD: Use the official GitHub Action with minimal permissions
- Updates: Keep RMA updated to receive security fixes
# rma.toml - Recommended security settings
[security]
# Exclude sensitive directories from analysis
exclude = ["**/secrets/**", "**/.env*", "**/credentials/**"]
# Don't follow symlinks (prevents path traversal)
follow_symlinks = falseRMA includes several security features:
- No Code Execution: RMA only parses and analyzes code statically
- No Network Access: Core analysis is fully offline
- Path Validation: Prevents path traversal in file operations
- Memory Safety: Written in Rust with no unsafe code in critical paths
We thank the following individuals for responsibly disclosing security issues:
No reports yet
Thank you for helping keep RMA and its users safe!