The ZIBO Keyboard Input Plugin is designed with security and user safety as top priorities. As an X-Plane plugin that handles keyboard input and integrates with flight simulation systems, we take security seriously to protect users' simulation environments and personal data.
We actively maintain and provide security updates for the following versions:
| Version | Supported | Status | Notes |
|---|---|---|---|
| 1.0.7 | ✅ | Current stable release | Recommended |
| 1.0.6 | ✅ | Previous stable | Security updates only |
| 1.0.5 | Legacy | Critical security fixes only | |
| < 1.0.5 | ❌ | Unsupported | Please upgrade immediately |
Recommendation: Always use the latest stable version (currently 1.0.7) for the best security posture and latest features.
Input Validation: The plugin implements strict input validation and filtering:
- Only captures relevant keyboard input when explicitly enabled
- Validates all dataref access before usage
- Implements bounds checking for all string operations
- Uses safe string functions (
strncpy,snprintf) to prevent buffer overflows
Minimal Privileges: The plugin operates with minimal necessary privileges:
- Only accesses ZIBO 737-specific datarefs and commands
- No file system access beyond X-Plane's plugin directory
- No network communication capabilities
- No access to sensitive system resources
Memory Safety: Implemented defensive programming practices:
- All pointers checked for NULL before dereferencing
- Proper resource cleanup on plugin disable
- No dynamic memory allocation to prevent leaks
- Stack-based buffers with defined limits
Aircraft Detection: Secure aircraft identification:
- Only activates with verified ZIBO 737 aircraft (ICAO: B738)
- Continuously validates aircraft state
- Automatically disables if aircraft changes
Command Safety: Safe X-Plane command execution:
- Only sends commands to verified ZIBO FMC systems
- No arbitrary command execution
- Commands are validated before execution
-
Download from Official Sources:
- Only download from the official GitHub repository: https://github.com/6639835/X-Plane-KeyboardInput
- Verify the repository is legitimate before downloading
- Check the commit history and contributor information
-
Build from Source (Recommended):
- Build the plugin yourself using the provided build scripts
- Verify the source code before compilation
- Use official X-Plane SDK from developer.x-plane.com
-
File Integrity:
- Check file sizes and dates after installation
- Verify the plugin loads without errors in X-Plane
- Monitor X-Plane's Log.txt for any suspicious activity
-
Enable Only When Needed:
- Only enable keyboard input when actively using the FMC
- Disable the plugin when not needed to minimize attack surface
- Be aware of which FMC position is active (visual indicators)
-
Monitor Behavior:
- Watch for unexpected FMC input or behavior
- Check that keyboard shortcuts still work normally in X-Plane
- Report any unusual plugin behavior immediately
-
System Security:
- Keep X-Plane updated to the latest version
- Use updated operating systems with current security patches
- Run antivirus software if on Windows platforms
We take security vulnerabilities seriously and appreciate responsible disclosure. If you discover a security issue, please follow these steps:
- Do NOT create public GitHub issues for security vulnerabilities
- Contact us directly using one of these methods:
- GitHub Security Advisory: Use GitHub's private vulnerability reporting feature
- Email: Contact the maintainer directly (see repository for contact information)
- Direct Message: Through GitHub private messaging
When reporting a vulnerability, please provide:
- Vulnerability Description: Clear description of the security issue
- Impact Assessment: Potential impact and severity
- Reproduction Steps: Detailed steps to reproduce the vulnerability
- Environment Details:
- X-Plane version and platform
- Operating system and version
- Plugin version affected
- ZIBO aircraft version (if relevant)
- Proof of Concept: Code or screenshots demonstrating the issue (if safe to share)
- Suggested Fix: If you have ideas for mitigation or fixes
We are committed to responding to security reports promptly:
- Initial Response: Within 48 hours of report
- Assessment: Within 7 days for impact and severity evaluation
- Fix Development: Timeline depends on complexity, typically 1-4 weeks
- Public Disclosure: After fix is available and users have time to update
We follow responsible disclosure practices:
- We will work with you to understand and validate the vulnerability
- We will develop and test fixes before public release
- We will coordinate disclosure timing with the reporter
- We will provide credit to the reporter in release notes (if desired)
- We may request a CVE ID for significant vulnerabilities
- Immediate Assessment: Evaluate severity and impact
- User Communication: Notify users of potential risks if critical
- Fix Development: Develop and test security patches
- Testing: Thorough testing across all supported platforms
- Release: Expedited release for security fixes
- Documentation: Update security documentation and advisories
We use the following severity levels:
- Critical: Remote code execution, privilege escalation, or system compromise
- High: Significant data exposure or unauthorized access
- Medium: Moderate security risk with limited impact
- Low: Minor security improvements or hardening
- All source code is publicly available and auditable
- Changes are tracked through version control with signed commits
- Build process is documented and reproducible
- No obfuscated or binary-only components
- Official builds use clean, controlled build environments
- All dependencies are from official sources (X-Plane SDK, system libraries)
- Build scripts are auditable and included in the repository
- Cross-platform builds follow identical security practices
- Primary: Official GitHub repository releases
- Verification: Release checksums and signatures provided
- Mirrors: We do not endorse third-party distribution sites
- Security updates are prioritized and released as quickly as possible
- Users are notified through GitHub releases and repository announcements
- Critical security updates may skip normal release cycles
- Update instructions are provided with each security release
The plugin does not include automatic update capabilities for security reasons:
- Prevents unauthorized code execution
- Allows users to review changes before updating
- Maintains user control over their X-Plane environment
For security-related inquiries:
- Repository: https://github.com/6639835/X-Plane-KeyboardInput
- Security Issues: Use GitHub's private vulnerability reporting
- General Security Questions: Create a discussion thread
Our security response team includes:
- Project maintainers with X-Plane development expertise
- Community members with security backgrounds
- External security researchers (when needed)
- X-Plane Plugin Security
- Plugin installation and verification guides
- System security recommendations for flight simulation
v1.0.7:
- Enhanced input validation and bounds checking
- Improved memory safety and resource management
- Strengthened aircraft detection validation
- Added comprehensive error handling
v1.0.6:
- Initial security hardening implementation
- Basic input sanitization
- Memory leak prevention
We thank the security research community and X-Plane development community for their ongoing efforts to improve plugin security. Special thanks to contributors who have reported security issues responsibly.
Last Updated: August 2025 Version: 1.0 Author: Justin
For the most current security information, always refer to the latest version of this document in the official repository.