| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Palrun includes built-in security features to protect users:
- Dangerous Pattern Detection: Detects and warns about potentially harmful commands
- Shell Injection Prevention: Identifies shell injection attempts
- Path Traversal Protection: Blocks excessive directory traversal
- Privilege Escalation Detection: Warns about sudo and setuid operations
- Environment Variable Protection: Redacts sensitive variables (API keys, passwords)
- Null Byte Detection: Rejects commands containing null bytes
- Length Validation: Limits command length to prevent buffer issues
- Zero Unsafe Code:
#![forbid(unsafe_code)]enforced throughout - Clippy Lints: Strict linting with
-D warnings - Dependency Auditing: Regular
cargo auditchecks
If you discover a security vulnerability in Palrun, please report it responsibly:
- DO NOT open a public GitHub issue
- Email security concerns to the maintainers
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Fix Timeline: Depends on severity
- Critical: Within 24-48 hours
- High: Within 1 week
- Medium: Within 2 weeks
- Low: Next release cycle
- We follow coordinated disclosure
- Vulnerabilities will be publicly disclosed after a fix is available
- Credit will be given to reporters (unless anonymity is requested)
- Use environment variables for API keys
- Never commit keys to version control
- Consider using OS keychain for sensitive credentials
- Review commands before execution (enabled by default)
- Use
--dry-runfor unfamiliar commands - Be cautious with piped commands from external sources
- Only install plugins from trusted sources
- Review plugin permissions before enabling
- Plugins run in a sandboxed WASM environment
- Static analysis via
cargo clippyon every build - Dependency scanning via
cargo auditin CI/CD - Integration tests for security features (24+ tests)
- Local Execution: Commands run with user's permissions
- AI Responses: AI-generated commands should be reviewed before execution
- Network Access: Some features require internet (AI, webhooks)
For security concerns, please use responsible disclosure as described above.