-
Notifications
You must be signed in to change notification settings - Fork 0
Feature/domainator integration #30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from all commits
Commits
Show all changes
22 commits
Select commit
Hold shift + click to select a range
df108f8
Fix: Small inconsistencies leading to errors
685ecc6
Feat: Added a feature calculation function that works based on window…
88c5391
Feat: Added the Domainator train functionality, as well as the adjust…
7d5c994
Fix: Adjusted documentation text
96d30a4
Feat: Added a separate Detector module for Domainator according to th…
93f8bf5
Fix: Feature order to mirror the original implementation
d249eee
Fix Zeek build issue in newer versions.
maldwg 8972394
Remove scaler for heidgaf and dominator as these are not necessary fo…
maldwg c6fac60
Finish domainator integration with sample config
maldwg 002f3d6
Update rst file documentation + minimal cleanup
maldwg 3d57802
Update rst file documentation
maldwg 7a0c004
Add alerting to file
maldwg 0f2438b
Add alerter stage with plugin based configuration
maldwg 5f93918
Fix small errors in alerter
maldwg 654257e
Small timer fixes
maldwg 0dfe415
remove datasets Closes #2
maldwg dae2779
remove unused data
maldwg 2e14686
remove unnecessary files
maldwg 88cf732
Repo polish
maldwg 16392ea
Merge branch 'dev' into feature/domainator-integration
maldwg fc5b8d9
remove unnecessary coe and datasets & fix readme
maldwg f870048
remove CIC remainders
maldwg File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,223 @@ | ||
| # Security Policy | ||
|
|
||
| ## Purpose | ||
|
|
||
| This document defines how security issues affecting the python release of `Hamstring` must be reported, handled, remediated, and disclosed. The goal is to ensure that security-relevant findings are managed confidentially, triaged consistently, and resolved within appropriate operational timelines. | ||
|
|
||
| ## Supported Versions | ||
|
|
||
| Security fixes are provided for the latest released major version. | ||
|
|
||
| | Version | Supported | | ||
| | ------- | --------- | | ||
| | `main` / latest release | Yes | | ||
| | Previous minor release | Yes | | ||
| | Older releases | No | | ||
|
|
||
| ## Confidential Reporting | ||
|
|
||
| Security issues must be reported through confidential channels only. Public | ||
| GitHub issues, public pull requests, or other public forums must not be used | ||
| for reporting vulnerabilities. | ||
|
|
||
| Approved reporting channels: | ||
|
|
||
| - GitHub Private Vulnerability Reporting / Security Advisories | ||
| - Email: `pm300@uni-heidelberg.de` | ||
|
|
||
| Reports should include, where available: | ||
|
|
||
| - A concise description of the issue | ||
| - Affected component, endpoint, container, or workflow | ||
| - Reproduction steps or validation details | ||
| - Expected impact and potential exploitation scenario | ||
| - Affected version, branch, commit, or image tag | ||
| - Relevant logs, screenshots, request samples, or proof-of-concept material | ||
| - Whether the issue appears actively exploited or time-sensitive | ||
|
|
||
| ## Confidentiality Requirements | ||
|
|
||
| All reported security issues are handled as confidential until review is | ||
| complete and a coordinated disclosure decision has been made. | ||
|
|
||
| During this period: | ||
|
|
||
| - Issue details must not be disclosed publicly | ||
| - Sensitive technical details must be shared only on a need-to-know basis | ||
| - Access to internal discussion, remediation branches, and advisory drafts | ||
| should be restricted | ||
| - If there is evidence of active exploitation, internal escalation should occur | ||
| immediately | ||
|
|
||
| ## Intake and Triage | ||
|
|
||
| Each report is reviewed to determine: | ||
|
|
||
| - Whether the issue is reproducible | ||
| - Whether it affects a supported version | ||
| - Whether there is a meaningful confidentiality, integrity, or availability impact | ||
| - Whether exploitation requires special conditions or privileged access | ||
| - Whether the issue represents active exploitation, a misconfiguration, or a | ||
| theoretical weakness without practical impact | ||
|
|
||
| Severity should be classified as `Critical / High / Medium / Low`. | ||
|
|
||
| ## Response Targets | ||
|
|
||
| The following target times apply to supported versions and valid security | ||
| reports. These targets are operational goals, not contractual guarantees. | ||
|
|
||
| | Stage | Target | | ||
| | ----- | ------ | | ||
| | Initial acknowledgement | Within 2 business days | | ||
| | Initial triage decision | Within 5 business days | | ||
| | First remediation update | Within 7 calendar days | | ||
| | Ongoing status updates | At least every 7 calendar days | | ||
| | Critical issue remediation plan | Within 7 calendar days | | ||
| | High severity remediation plan | Within 14 calendar days | | ||
| | Medium severity remediation plan | Within 30 calendar days | | ||
| | Low severity remediation plan | Best effort | | ||
|
|
||
| If a report indicates active exploitation, credential exposure, remote code | ||
| execution, or broad unauthorized access, the issue should be escalated as an | ||
| incident and handled with priority outside normal backlog processes. | ||
|
|
||
| ## Remediation Process | ||
|
|
||
| When a security issue is confirmed, maintainers should: | ||
|
|
||
| - Reproduce and validate the issue | ||
| - Define affected versions and deployment scenarios | ||
| - Prepare a remediation plan proportional to the severity | ||
| - Implement and review the fix | ||
| - Backport the fix to supported versions where feasible | ||
| - Validate the fix before release | ||
| - Prepare customer-facing or operator-facing guidance if configuration or | ||
| operational action is required | ||
|
|
||
| Where immediate remediation is not possible, temporary mitigations should be | ||
| documented and communicated clearly. | ||
|
|
||
| ## Disclosure and Publication | ||
|
|
||
| Confirmed vulnerabilities are disclosed in a coordinated manner after one of | ||
| the following conditions is met: | ||
|
|
||
| - A fix has been released | ||
| - A mitigation has been published and the residual risk is understood | ||
| - A disclosure deadline has been reached and leadership approves publication | ||
|
|
||
| The default disclosure target is `90 days`, but the actual window may be | ||
| shortened or extended based on: | ||
|
|
||
| - Evidence of exploitation | ||
| - Fix availability and deployment risk | ||
| - Customer exposure | ||
| - Dependency or vendor coordination needs | ||
|
|
||
| Public disclosures may include: | ||
|
|
||
| - A security advisory | ||
| - Release notes | ||
| - Upgrade or mitigation instructions | ||
| - Severity and affected-version information | ||
|
|
||
| ## Operational Communication | ||
|
|
||
| Where a confirmed issue affects deployed environments, communication should be | ||
| proportionate to impact. This may include: | ||
|
|
||
| - Internal security or operations escalation | ||
| - Notification to administrators, customers, or service owners | ||
| - Temporary mitigation guidance | ||
| - Required upgrade or rotation steps | ||
| - Post-remediation confirmation and closure | ||
|
|
||
| Security communications should avoid unnecessary disclosure of exploit details | ||
| before mitigations are available. | ||
|
|
||
| ## Scope | ||
|
|
||
| The following areas are considered in scope for security handling: | ||
|
|
||
| - Authentication and authorization controls | ||
| - Password handling and account lifecycle | ||
| - File upload, parsing, and processing pipelines | ||
| - Secrets handling and environment configuration | ||
| - Data access controls and audit logging | ||
| - Container, service, and network configuration | ||
| - Dependency vulnerabilities with validated product impact | ||
| - Sensitive data exposure, privilege escalation, SSRF, RCE, injection, and | ||
| broken access control | ||
|
|
||
| ## Out of Scope | ||
|
|
||
| The following are generally not treated as security vulnerabilities unless | ||
| clear and demonstrated security impact exists: | ||
|
|
||
| - Cosmetic misconfigurations without exploitability | ||
| - Missing hardening headers without a practical attack path | ||
| - Issues affecting unsupported or end-of-life releases only | ||
| - Hypothetical findings without reproducible impact | ||
| - Third-party platform issues outside the control of this project | ||
| - Reports based only on scanner output without technical validation | ||
|
|
||
| ## Safe Handling Expectations | ||
|
|
||
| Anyone validating a suspected issue is expected to act in a controlled and | ||
| minimal manner. | ||
|
|
||
| Expected behavior: | ||
|
|
||
| - Limit activity to what is necessary to confirm the issue | ||
| - Avoid unauthorized access to non-public or third-party data | ||
| - Avoid disruption of production systems | ||
| - Avoid persistence, data modification, or data destruction | ||
| - Stop testing and report promptly once the issue is confirmed | ||
|
|
||
| This policy does not authorize: | ||
|
|
||
| - Access to data belonging to other users or organizations | ||
| - Service disruption or denial-of-service activity | ||
| - Data exfiltration or retention of sensitive information | ||
| - Any activity that violates applicable law or contractual obligations | ||
|
|
||
| ## Security Updates | ||
|
|
||
| Security fixes may be distributed through one or more of the following: | ||
|
|
||
| - Normal release process | ||
| - Out-of-band patch release | ||
| - Security advisory | ||
| - Operational mitigation notice | ||
|
|
||
| Where appropriate, the published update should include: | ||
|
|
||
| - Affected versions | ||
| - Fixed versions | ||
| - Severity | ||
| - Upgrade path | ||
| - Required operational actions | ||
|
|
||
| ## Escalation | ||
|
|
||
| If no acknowledgement is received within the response target above, the report | ||
| should be resent to: | ||
|
|
||
| - `pm300@uni-heidelberg.de` | ||
|
|
||
| Urgent reports involving active exploitation or high-confidence compromise | ||
| should use the subject line: | ||
|
|
||
| `[URGENT SECURITY REPORT]` | ||
|
|
||
| ## Policy Maintenance | ||
|
|
||
| This policy should be reviewed whenever: | ||
|
|
||
| - Reporting channels change | ||
| - Supported versions change | ||
| - Incident response expectations change | ||
| - Disclosure commitments change | ||
|
|
||
| Last reviewed: `27-03-2026` |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.