Web Resource Ledger does not publish versioned releases yet. Security fixes are applied to the main branch. We recommend always running the latest commit on main.
Please report security vulnerabilities through GitHub Security Advisories. This creates a private discussion where we can assess the issue before any public disclosure.
Please do not open a public issue for security vulnerabilities.
We will acknowledge receipt of your report within 72 hours and aim to provide an initial assessment within 7 days. These are goals, not guarantees -- this is a small project maintained in spare time. We do take every report seriously.
The following are considered security issues:
- SSRF bypasses or unintended outbound requests
- Authentication or API key bypass
- Admin API key compromise or bypass (obtaining admin-level access to key management without
ADMIN_KEY) - Tenant data isolation escape (one tenant accessing or listing captures belonging to another tenant)
- Signature verification flaws (e.g., accepting tampered archives as valid)
- Cross-site scripting (XSS) on the verification page
- Exposure of signing keys or secrets through any code path
Known gap (single-tenant deployments): GET /v1/captures/{id} and associated artifact and verify endpoints do not require authentication -- the capture ID acts as the access secret. This is intentional for the current single-tenant design and documented in the source. When a second tenant is onboarded, access control for these endpoints should be revisited. A backlog item tracks this: see docs/backlog.md.
The following are regular bugs, not security issues:
- Incorrect capture output for unusual page types
- Performance or reliability issues
- UI/layout problems on the verification page
We will coordinate with you before any public disclosure. We will credit you in the advisory unless you prefer to remain anonymous.