If you discover a security vulnerability in PluginHunter, please report it responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please email:
- Email: letchupkt.dev@gmail.com
- Subject: [SECURITY] PluginHunter Vulnerability Report
Please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Your contact information
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 1-7 days
- High: 7-14 days
- Medium: 14-30 days
- Low: 30-90 days
We follow responsible disclosure:
- You report the vulnerability privately
- We acknowledge and investigate
- We develop and test a fix
- We release the fix
- We publicly disclose (with credit to you, if desired)
When using PluginHunter:
-
Keep Updated
pip install --upgrade PluginHunter
-
Protect Configuration Files
chmod 600 server_config.json
-
Secure Credentials
- Don't commit config files with tokens
- Use environment variables for sensitive data
- Rotate tokens regularly
-
Server Mode Security
- Run on secure VPS
- Use firewall rules
- Enable SSH key authentication
- Monitor access logs
-
Report Storage
- Protect report directories
- Don't expose reports publicly
- Archive old reports securely
| Version | Supported |
|---|---|
| 1.2.x | ✅ |
| < 1.2 | ❌ |
- Dynamic Verification: Requires Docker and may execute potentially dangerous code in containers
- Server Mode: Stores sensitive tokens in configuration files
- Reports: May contain sensitive information about vulnerabilities
PluginHunter includes:
- No arbitrary code execution (except in isolated Docker containers for dynamic verification)
- Input validation for all user inputs
- Safe file handling
- Secure HTTP requests
- No storage of credentials in code
PluginHunter is a security research tool. Users are responsible for:
- Obtaining proper authorization before scanning
- Complying with applicable laws
- Following responsible disclosure practices
- Not using the tool for malicious purposes
We appreciate security researchers who help improve PluginHunter. With your permission, we'll credit you in:
- CHANGELOG.md
- Security advisories
- Release notes
Author: LAKSHMIKANTHAN K (letchupkt)
License: MIT