Skip to content

Latest commit

 

History

History
49 lines (33 loc) · 2.63 KB

SECURITY.md

File metadata and controls

49 lines (33 loc) · 2.63 KB

Security Policy

Do not report security vulnerabilities through public GitHub issues.

Please use the Private Vulnerability Disclosure feature of GitHub.

Include as much of the following information:

  • Type of issue (e.g. improper input parsing, privilege escalation, etc.)
  • The location of the affected source code (tag/branch/commit or direct URL)
  • Any special configuration required to reproduce the issue
  • The distribution affected or used to help us with reproduction of the issue
  • Step-by-step instructions to reproduce the issue
  • Ideally a reproduction repository
  • Impact of the issue, including how an attacker might exploit the issue

We prefer to receive reports in English.

Contact

Please disclose a vulnerability or security relevant issue here: https://github.com/tauri-apps/plugins-workspace/security/advisories/new.

Alternatively, you can also contact us by email via [email protected].

Threat Model

This plugin possibly allows access to the full filesystem available to the application process. Depending on the operating system the access is already confined (android/ios) to only certain locations. In other operating systems like Linux/MacOS/Windows it depends on the installation and packaging method but in most cases full access is granted.

To prevent exposure of sensitive locations and data this plugin can be scoped to only allow certain base directories or only access to specific files or subdirectories. This scoping effectively affects only calls made from the webviews/frontend code and calls made from rust can always circumvent the restrictions imposed by the scope.

The scope is defined at compile time in the used permissions but the user or application developer can grant or revoke access to specific files or folders at runtime by modifying the scope state through the runtime authority, if configured during plugin initialization.

Security Assumptions

  • The filesystem access is limited by user permissions
  • The operating system filesystem access confinment works as documented
  • The scoping mechanism of the Tauri fs commands work as intended and has no bypasses
  • The user or application developer can grant or revoke access to specific files at runtime by modifying the scope

Out Of Scope

  • Exploits in underlying filesystems
  • Exploits in the underlying rust std::fs library