| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of reflector-native seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
- Email: [[email protected]] (replace with your actual security contact)
You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.
Please include the following information:
- Type of issue (e.g., buffer overflow, privilege escalation, etc.)
- Full paths of source file(s) related to the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
This information will help us triage your report more quickly.
- Raw Socket Access: This application requires raw socket access (root/sudo) to capture and inject packets at the link layer
- No Authentication: The reflector does not implement authentication - rely on network-level security
- No Encryption: Packets are reflected as-is without encryption
- DoS Protection: No built-in rate limiting - can be overwhelmed by packet floods
- Isolated Networks: Deploy in isolated test networks, not production
- Firewall Rules: Use firewall rules to limit which hosts can send packets
- Monitoring: Monitor for unexpected traffic patterns
- Updates: Keep the software and OS up to date
- Permissions: Run with minimum required privileges where possible
- Designed for trusted test environments (lab/test networks)
- Not hardened for hostile network environments
- No input validation on reflected packets (intentional for test tool)
- Processes all packets matching ITO signature without authentication
We use the following security measures:
- CodeQL - Automated code scanning for vulnerabilities
- Gitleaks - Secret detection in code and commits
- cppcheck - Static analysis for C code
- Pre-commit hooks - Secret detection before commits
- Dependency scanning - Regular checks for vulnerable dependencies
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release patched versions as soon as possible
If you have suggestions on how this process could be improved, please submit a pull request.