** Security Policy** Supported Versions ┌─────────┬────────────────────┐ │ Version │ Supported │ ├─────────┼────────────────────┤ │ 1.0.x │ ✅ │ └─────────┴────────────────────┘ Reporting a Vulnerability
** We take the security of DeadBYTE seriously. If you discover a security vulnerability, please follow these steps:**
** How to Report**
- Do NOT open a public GitHub issue for security vulnerabilities
- Send a detailed report to: moner.intelligence@gmail.com
- Include the following information: - Description of the vulnerability - Steps to reproduce the issue - Potential impact - Any suggested fixes (optional)
** What to Expect**
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Timeline: Depends on severity (critical issues prioritized)
** Severity Levels** ┌──────────┬────────────────────────────────────────────────────┬───────────────┐ │ Level │ Description │ Response Time │ ├──────────┼────────────────────────────────────────────────────┼───────────────┤ │ Critical │ System compromise, data loss, privilege escalation │ 24-48 hours │ ├──────────┼────────────────────────────────────────────────────┼───────────────┤ │ High │ Significant security impact │ 1 week │ ├──────────┼────────────────────────────────────────────────────┼───────────────┤ │ Medium │ Limited security impact │ 2 weeks │ ├──────────┼────────────────────────────────────────────────────┼───────────────┤ │ Low │ Minimal security impact │ 1 month │ └──────────┴────────────────────────────────────────────────────┴───────────────┘
** Security Considerations**
DeadBYTE is a system utility that requires administrator privileges. Users should be aware:
- Run from trusted sources only - Only download from official releases
- Administrator access - The application requires elevated privileges for system operations
- File operations - Force delete and permission changes are irreversible
- Process management - Terminating system processes may cause instability
** Responsible Disclosure**
We kindly ask security researchers to:
- Allow reasonable time for us to address the issue before public disclosure
- Avoid accessing or modifying other users' data
- Act in good faith to avoid privacy violations and service disruptions
** Acknowledgments**
We appreciate the security research community's efforts in helping keep DeadBYTE secure. Responsible reporters will be credited in our release notes.