If you discover a security vulnerability in tauri-conduit, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please email: [security contact -- use GitHub's private vulnerability reporting]
Or use GitHub's private vulnerability reporting feature.
tauri-conduit runs entirely in-process within a Tauri v2 application. There is no network surface.
- In scope: Memory safety, authentication bypass, side-channel attacks on invoke key validation, buffer overflows in codec/ring buffer, denial of service via malformed frames.
- Out of scope: Attacks requiring code execution in the same process (the attacker already has full access), physical access, webview sandbox escapes (those are Tauri/platform bugs).
- Per-launch invoke key: 32 random bytes (via
getrandom), hex-encoded, validated with constant-time comparison (subtlecrate) on every custom protocol request. - No network surface: All communication runs in the same address space via Tauri's custom protocol handler. No ports, no sockets, no endpoints.
- Flat invoke key (no per-command ACL): Any webview with the invoke key can call any registered command. This is simpler than Tauri's per-command capability system. For granular access control, use Tauri's built-in IPC.
- CSP compliance: Custom protocol handler does not require Content Security Policy exceptions.
| Version | Supported |
|---|---|
| 2.1.x | Yes |
| 2.0.x | Security fixes only |
| 1.0.x | Security fixes only |
| 0.1.x | No |