| Version | Supported |
|---|---|
| 1.1.x | Yes |
| < 1.1 | No |
Do not open a public issue for security vulnerabilities.
Instead, use GitHub Security Advisories to report privately.
- Description of the vulnerability
- Steps to reproduce
- Impact assessment (what data could be exposed, what could an attacker do)
- Affected version(s)
- 72 hours: Initial acknowledgment
- 7 days: Triage and severity assessment
- 90 days: Fix released (critical issues prioritized)
The following are considered security vulnerabilities:
- Data exposure: Field values visible to screen capture despite protection being active
- Capture bypass: Methods to circumvent
WDA_EXCLUDEFROMCAPTUREprotection - Privilege escalation: App performing actions beyond its intended scope
- Sensitive data leakage: Field values written to disk, network, clipboard, or logs
- Registry/file tampering: Settings file or registry entries used to execute arbitrary code
- Social engineering attacks
- Denial of service against the local application
- Issues requiring physical access to the machine
- Vulnerabilities in third-party screen capture tools themselves
- Fields that are not detected as sensitive (feature request, not security issue)
- Zero network calls. Zero telemetry. Zero data collection.
- Field values are read via UI Automation, displayed in a local mirror window, and never persisted.
- Log files record only timestamps and event names, never field values or names.
- Settings file stores only UI preferences and detection keywords.
- Chrome extension uses Manifest V3 with minimal permissions (
activeTab,storage). - All dependencies are built-in .NET / Win32 APIs. Zero NuGet packages. Zero npm packages.