We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take the security of crgx seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please email security reports to the maintainers. You can find contact information in CONTRIBUTING.md.
Please include the following information in your report:
- Type of issue (e.g. arbitrary code execution, path traversal, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- We will acknowledge your email within 48 hours
- We will send a more detailed response within 7 days indicating the next steps
- We will keep you informed about progress towards a fix
- We may ask for additional information or guidance
- Once fixed, we will publicly disclose the vulnerability (crediting you if desired)
crgx downloads and executes third-party binaries. Users should be aware of:
- Binary provenance: crgx downloads pre-built binaries from crate authors' configured sources, GitHub Releases, or cargo-quickinstall. Verify that you trust the crate before running it.
- No code signing verification: Downloaded binaries are not currently verified against signatures or checksums beyond HTTPS transport security.
- Cache integrity: Cached binaries at
~/.cache/crgx/should be treated as executable code. Protect the cache directory with appropriate file permissions. -yflag: The--yesflag skips the download confirmation prompt. Use with caution in automated environments.
- Review crates before running: Check the crate on crates.io before first use
- Pin versions in CI: Use exact versions (
crgx tool@1.2.3) in automated pipelines - Protect your cache: Ensure
~/.cache/crgx/is only writable by your user - Update regularly: Keep crgx updated with latest security patches
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release patches as soon as possible
We ask security researchers to:
- Give us reasonable time to respond before public disclosure
- Make a good faith effort to avoid privacy violations and service disruption
- Not access or modify other users' data
If you have suggestions on how this process could be improved, please submit a pull request.