Skip to content

Security: w8mej/GhostTelemetry

Security

SECURITY.md

Security Policy

Supported Versions

We support the latest version of GhostTelemetry.

Version Supported
1.0.x
< 1.0

Reporting a Vulnerability

We take the security of GhostTelemetry seriously. If you discover a security vulnerability, please do not disclose it publicly.

Private Disclosure Process

  1. Email: Send a detailed description of the vulnerability to ghost@haxx.ninja.
  2. Encryption: If possible, please encrypt your message using my PGP key (available upon request).
  3. Response: We will acknowledge your report within 48 hours and provide a timeline for triage and remediation.

What to Include

  • Description of the vulnerability.
  • Steps to reproduce.
  • Potential impact.
  • Proof of concept (PoC) code or screenshots.

Our Commitment

  • We will keep you informed of my progress.
  • We will not pursue legal action against researchers who follow this policy and practice responsible disclosure.
  • We will acknowledge your contribution in my release notes (with your permission).

TEE Specific Concerns

If you find a vulnerability related to:

  • Attestation bypass
  • Side-channel leakage
  • Ledger immutability compromise

Please mark the subject line as [CRITICAL] TEE VULNERABILITY.

There aren’t any published security advisories