Skip to content

Security: moner-dev/DeadByte

SECURITY.md

** Security Policy** Supported Versions ┌─────────┬────────────────────┐ │ Version │ Supported │ ├─────────┼────────────────────┤ │ 1.0.x │ ✅ │ └─────────┴────────────────────┘ Reporting a Vulnerability

** We take the security of DeadBYTE seriously. If you discover a security vulnerability, please follow these steps:**

** How to Report**

  1. Do NOT open a public GitHub issue for security vulnerabilities
  2. Send a detailed report to: moner.intelligence@gmail.com
  3. Include the following information: - Description of the vulnerability - Steps to reproduce the issue - Potential impact - Any suggested fixes (optional)

** What to Expect**

  • Initial Response: Within 48 hours
  • Status Update: Within 7 days
  • Resolution Timeline: Depends on severity (critical issues prioritized)

** Severity Levels** ┌──────────┬────────────────────────────────────────────────────┬───────────────┐ │ Level │ Description │ Response Time │ ├──────────┼────────────────────────────────────────────────────┼───────────────┤ │ Critical │ System compromise, data loss, privilege escalation │ 24-48 hours │ ├──────────┼────────────────────────────────────────────────────┼───────────────┤ │ High │ Significant security impact │ 1 week │ ├──────────┼────────────────────────────────────────────────────┼───────────────┤ │ Medium │ Limited security impact │ 2 weeks │ ├──────────┼────────────────────────────────────────────────────┼───────────────┤ │ Low │ Minimal security impact │ 1 month │ └──────────┴────────────────────────────────────────────────────┴───────────────┘

** Security Considerations**

DeadBYTE is a system utility that requires administrator privileges. Users should be aware:

  • Run from trusted sources only - Only download from official releases
  • Administrator access - The application requires elevated privileges for system operations
  • File operations - Force delete and permission changes are irreversible
  • Process management - Terminating system processes may cause instability

** Responsible Disclosure**

We kindly ask security researchers to:

  • Allow reasonable time for us to address the issue before public disclosure
  • Avoid accessing or modifying other users' data
  • Act in good faith to avoid privacy violations and service disruptions

** Acknowledgments**

We appreciate the security research community's efforts in helping keep DeadBYTE secure. Responsible reporters will be credited in our release notes.

There aren't any published security advisories