| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please send an email to: contact@hdds.io
Include the following information:
- Type of vulnerability (e.g., code injection via IDL, path traversal in output)
- Full path of the affected source file(s)
- Location of the affected code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept IDL file (if applicable)
- Impact assessment
- Acknowledgment: Within 48 hours of your report
- Initial Assessment: Within 7 days
- Resolution Timeline: Depends on severity (critical: 7 days, high: 30 days, medium: 90 days)
- Public Disclosure: Coordinated with you after fix is available
We consider security research conducted in good faith to be authorized. We will not pursue legal action against researchers who:
- Make a good faith effort to avoid privacy violations and data destruction
- Only interact with accounts they own or with explicit permission
- Do not exploit vulnerabilities beyond what is necessary to demonstrate the issue
- Report vulnerabilities promptly and do not publicly disclose before resolution
- hdds_gen parses untrusted IDL input files
- The parser is designed to handle malformed input gracefully
- Recursive structures are bounded to prevent stack overflow
- Generated file paths are validated to prevent path traversal
- Output directories are created with appropriate permissions
- No arbitrary code execution from IDL content
- We regularly update dependencies to patch known vulnerabilities
- Use
cargo auditto check for known issues
We thank all security researchers who help keep hdds_gen secure. Contributors who report valid security issues will be acknowledged here (with permission).