| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Fackel is a security tool — we take vulnerabilities in the tool itself very seriously.
Do NOT open a public issue for security vulnerabilities.
Instead, please report them via GitHub private vulnerability reporting:
- Go to the Security tab of this repository.
- Click "Report a vulnerability".
- Fill in the details — affected component, reproduction steps, potential impact.
We aim to acknowledge reports within 48 hours and provide an initial assessment within 5 business days.
- Command injection via tool inputs (bypass of
guard_target/ sanitizers) - Arbitrary code execution through crafted scan targets
- Secrets leakage (API keys, tokens) in logs or reports
- Dependency vulnerabilities with a viable exploit path
- Missing features or documentation gaps
- Findings against targets you scan with Fackel (that's the tool working as intended)
- Denial of service against Fackel itself (it's a CLI tool, not a service)
We follow coordinated disclosure. If you report a vulnerability:
- We will work with you on a fix.
- We will credit you in the release notes (unless you prefer anonymity).
- We ask that you do not disclose publicly until a fix is released.
Thank you for helping keep Fackel secure.