We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
-
GitHub Security Advisories (preferred):
- Go to https://github.com/yourusername/lpm/security/advisories/new
- Click "New draft security advisory"
- Fill out the form with details about the vulnerability
-
Email (if GitHub is not accessible):
- Please use GitHub Security Advisories if possible
- If email is necessary, contact the repository maintainers
- Subject: "Security Vulnerability in LPM"
- Include as much detail as possible about the vulnerability
When reporting a vulnerability, please include:
- Type of vulnerability (e.g., XSS, injection, etc.)
- Full paths of source file(s) related to the vulnerability
- Location of the affected code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution: Depends on severity and complexity
- We will acknowledge receipt of your vulnerability report within 48 hours
- We will provide an initial assessment within 7 days
- We will keep you informed of our progress
- We will notify you when the vulnerability is fixed
- We will credit you in the security advisory (if you wish)
When using LPM:
- Always use lockfiles: Commit
lpm.lockto ensure reproducible builds - Run security audits: Use
lpm auditto check for known vulnerabilities - Keep dependencies updated: Regularly update packages with
lpm update - Verify checksums: LPM automatically verifies package checksums
- Review dependencies: Be cautious when adding new dependencies
LPM includes several security features:
- Checksum verification: All packages are verified against checksums in the lockfile
- Sandboxed builds: Rust extensions are built in isolated environments
- No postinstall scripts: LPM does not execute arbitrary code during installation
- OSV integration: Automatic vulnerability scanning via OSV database
- Secure credential storage: Uses OS keychains for credential management
- LPM does not execute postinstall scripts for security reasons
- Build processes are sandboxed to limit filesystem and network access
- Package checksums are verified before installation
- Dynamic requires in Lua code are tracked and warned about
Security updates will be released as patch versions following Semantic Versioning. Critical security fixes may be backported to previous versions on a case-by-case basis.
For more information about LPM's security features, see docs/user/Security.md.