| Version | Supported |
|---|---|
| 1.3.x | ✅ |
| 1.2.x | ✅ |
| 1.1.x | ❌ |
| 1.0.x | ❌ |
Duplicate File Remover is designed with security and data safety as top priorities:
- Local-Only Processing: All file operations happen locally on your machine. No data is transmitted over the network.
- Read-Only Scanning: The scanning process only reads files to calculate content hashes. Files are never modified during scanning.
- Recycle Bin Integration: By default, deleted files are moved to the Windows Recycle Bin, allowing recovery if needed.
- No Administrator Required: The application runs with standard user privileges. No elevation is required for normal operation.
- Special Character Support: Properly handles filenames with special characters (parentheses, spaces, Unicode characters, etc.)
- Long Path Support: Uses Windows extended path syntax (
\\?\) for paths exceeding 260 characters - Permission Handling: Gracefully handles files without delete permissions by showing appropriate error messages
- Locked File Detection: Skips files that are currently in use by other applications
- No External Network Calls: The application does not make any network requests
- No Telemetry: No usage data or crash reports are collected
- Open Source: Full source code is available for audit and review
- Minimal Dependencies: Only uses well-established, audited libraries
If you discover a security vulnerability in Duplicate File Remover, please follow these steps:
- Do NOT open a public issue on GitHub
- Do NOT disclose the vulnerability publicly until it has been addressed
- Do NOT include exploit code in public communications
- Email the maintainer directly at: ALIZARGHUNRAJPUT@GMAIL.COM
- Include the following information:
- Clear description of the vulnerability
- Steps to reproduce the issue
- Potential impact and severity assessment
- Affected version(s)
- Suggested fix or mitigation (if available)
- Your contact information for follow-up questions
| Timeframe | Action |
|---|---|
| Within 48 hours | Acknowledgment of receipt |
| Within 7 days | Initial assessment and response |
| Within 30 days | Fix released or timeline provided |
- We follow a responsible disclosure policy
- Once a fix is released, we will publicly acknowledge the reporter (with their permission)
- CVE numbers will be requested for serious vulnerabilities
- Backup Important Data: Always maintain backups of critical files before using any file deletion tool
- Test First: Run the application on a small test folder to understand its behavior
- Verify Results: Use the "Open Location" feature to verify files before deletion
- Enable Recycle Bin: Keep "Move to Recycle Bin" enabled for an extra safety net
- Review Selections: Carefully review selected files before confirming deletion
- Use Size Filters: Set appropriate minimum file size to avoid scanning system files
- Exclude System Directories: Do not scan Windows system directories
Add these patterns to the Excluded Patterns list for safer operation:
*.tmp
*.log
Thumbs.db
desktop.ini
.DS_Store
$RECYCLE.BIN
System Volume Information
Before running Duplicate File Remover on important data:
- I have backups of my important files
- I understand how the application works
- I have tested it on non-critical files first
- "Move to Recycle Bin" is enabled in settings
- I have reviewed the files selected for deletion
- I have verified files using "Open Location" before deleting
The following are known limitations that are not considered security vulnerabilities:
- File Permissions: The application cannot delete files for which the user does not have delete permissions
- In-Use Files: Files currently open by other applications cannot be deleted
- Network Paths: Performance on slow network drives may be reduced
- Very Large Files: Hashing multi-GB files will take proportionally longer
Security updates will be released as patch versions (e.g., 1.3.1). Users are encouraged to:
- Enable GitHub notifications for this repository
- Check the Releases page regularly
- Update to the latest version promptly
For security-related inquiries:
- Email: alizarghunrajput@gmail.com
- GitHub: @MAliXCS
- Instagram: @x404ctl
Last updated: 2024