| Version | Supported |
|---|---|
| 1.2.x | ✅ |
| 1.1.x | ✅ |
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security seriously. If you discover a security vulnerability in proc, please report it responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please email security concerns to: [email protected]
Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
-
Acknowledgment: We will acknowledge receipt of your report within 48 hours.
-
Investigation: We will investigate the issue and determine its severity.
-
Communication: We will keep you informed of our progress.
-
Resolution: We will work to resolve the issue as quickly as possible.
-
Credit: We will credit you in the release notes (unless you prefer to remain anonymous).
- Critical vulnerabilities: Patch within 24-48 hours
- High severity: Patch within 1 week
- Medium severity: Patch within 2 weeks
- Low severity: Patch in next regular release
proc is designed with security in mind:
-
No Network Access: proc only accesses local system information. It does not make network requests or phone home.
-
No Data Collection: proc does not collect, store, or transmit any user data or telemetry.
-
Minimal Privileges: proc runs with the privileges of the invoking user. It does not require or request elevated privileges except when explicitly needed (e.g., killing processes owned by other users).
-
Safe Defaults: Destructive operations (like
kill) require confirmation by default. -
Input Validation: All user inputs are validated to prevent injection attacks.
-
Memory Safety: Written in Rust, which provides memory safety guarantees.
We carefully vet all dependencies:
- Minimal dependency tree
- Only well-maintained, widely-used crates
- Regular dependency audits with
cargo audit - Pinned versions via
Cargo.lock
-
Process Information Access: On some systems, proc may not be able to access information about processes owned by other users without elevated privileges.
-
Signal Sending: Killing processes owned by other users requires appropriate permissions (typically root/sudo).
-
Port Information: Retrieving port information may require elevated privileges on some systems.
-
Review before killing: Always verify the processes you're about to kill, especially when using wildcards or patterns.
-
Use dry-run mode: When uncertain, use
--dry-runto see what would happen without making changes. -
Avoid running as root: Run proc with regular user privileges when possible. Only use sudo when necessary.
-
Keep proc updated: Install security updates when available.
| Date | Type | Findings | Resolution |
|---|---|---|---|
| 2026-01-12 | v1.0.0 Release | N/A | N/A |
For security concerns: [email protected]
For general questions: GitHub Issues