| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability in goperf, please report it responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please email security@unsaid.io with:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if you have one)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability within 7 days
- Fix timeline: Critical issues will be addressed within 30 days
- Disclosure: We will coordinate disclosure timing with you
Security issues we care about:
- Code execution: Arbitrary code execution via malicious Go files
- Path traversal: Reading/writing files outside the target directory
- Denial of service: Crashes or hangs on crafted input
- Information disclosure: Leaking sensitive information
- Issues in dependencies (report to the dependency maintainer)
- Issues requiring physical access to the machine
- Social engineering attacks
We appreciate responsible disclosure and will:
- Credit you in the release notes (unless you prefer anonymity)
- Add you to our security acknowledgments
goperf is designed with security in mind:
- Read-only by default: Only analyzes code and does not modify files (automatic fixing is not implemented)
- Path validation: Refuses to operate outside the current working directory
- Symlink protection: Validates symlinks don't escape the working directory
- Resource limits: Caps file count, file size, and directory depth
- No network access: Operates entirely locally
- Review suggestions: Use
--suggestto review proposed changes - Trust but verify: Treat suggestions as guidance and apply manually
- Keep updated: Use the latest version for security fixes