The following versions of Auriora projects are currently being supported with security updates:
| Project | Supported Versions |
|---|---|
| Admin Assistant | latest |
| TimeLocker | latest |
| OneMount | latest |
The Auriora team takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
If you believe you've found a security vulnerability in any Auriora project, please follow these steps:
- Do not disclose the vulnerability publicly until it has been addressed by the maintainers.
- Email your findings to [email protected]. If you don't receive a response within 48 hours, please follow up.
- Provide detailed information about the vulnerability, including:
- Project name and version affected
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact and severity assessment
- Affected components (authentication, file handling, network communication, etc.)
- Suggestions for mitigation or remediation
After you report a vulnerability:
- Acknowledgment: We will acknowledge receipt of your report within 48 hours.
- Investigation: We will investigate the issue and determine its severity and impact.
- Communication: We will keep you informed of our progress throughout the resolution process.
- Resolution: Once the issue is resolved, we will coordinate the disclosure timeline with you.
- Recognition: We will publicly acknowledge your responsible disclosure (unless you prefer to remain anonymous).
- Protect your Microsoft account: Use strong passwords and enable two-factor authentication
- Review permissions: Only grant necessary OneDrive and calendar access
- Keep updated: Always use the latest version for security patches
- Secure credentials: Store authentication tokens securely
- Monitor logs: Review application logs for unusual activity
- Backup encryption: Always use strong passwords for backup repositories
- Cloud credentials: Secure your S3/B2 access keys and rotate them regularly
- Local permissions: Ensure backup files have appropriate filesystem permissions
- Verify backups: Regularly test backup integrity and restoration
- Update dependencies: Keep Restic and TimeLocker updated
- Microsoft account security: Use strong passwords and 2FA for your Microsoft account
- Mount permissions: Use appropriate mount point permissions
- Network security: Be cautious when using OneMount on untrusted networks
- Cache security: Understand that cached files are stored locally
- Regular updates: Keep OneMount updated for security patches
Auriora projects follow these security principles:
- Minimal permissions: Request only necessary permissions from external services
- Secure authentication: Use industry-standard OAuth 2.0 implementations
- Token management: Secure storage and handling of authentication tokens
- Session management: Proper session handling and timeout mechanisms
- Encryption in transit: All network communications use HTTPS/TLS
- Local encryption: Sensitive data stored locally is properly protected
- Data minimization: Collect and store only necessary data
- Secure deletion: Proper cleanup of temporary and cached data
- Sanitization: All user inputs are properly validated and sanitized
- Path traversal protection: Prevent directory traversal attacks
- Command injection prevention: Secure handling of system commands
- File type validation: Proper validation of file types and content
Our projects rely on various third-party libraries and services:
- Microsoft Graph API
- Flask web framework
- SQLAlchemy ORM
- Various Python packages
- Restic backup tool
- Cloud storage SDKs (boto3, b2sdk)
- Python standard library
- Go standard library
- FUSE (go-fuse/v2)
- GTK3 (gotk3)
- Microsoft Graph API
We regularly review and update these dependencies to address known vulnerabilities.
- Day 0: Vulnerability reported
- Day 1-2: Acknowledgment and initial assessment
- Day 3-7: Detailed investigation and impact analysis
- Day 8-30: Development and testing of fix
- Day 31-45: Coordinated disclosure and patch release
- Day 46+: Public disclosure (if not already disclosed)
This timeline may vary based on the complexity and severity of the vulnerability.
- Primary: [email protected]
- Backup: [email protected]
- PGP Key: Available upon request
We would like to thank the following individuals who have helped improve the security of Auriora projects through responsible disclosure:
- [List will be updated as contributions are received]
This security policy is provided in good faith. Auriora reserves the right to modify this policy at any time. Security researchers who follow this policy will not face legal action from Auriora for their research activities.