We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
The TomatoTask team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings.
If you discover a security vulnerability, please report it by:
- Email: Send details to snpepito@gmail.com
- Private Security Advisory: Use GitHub's private vulnerability reporting feature at https://github.com/AnthonyMahe/TomatoTask/security/advisories/new
Please include the following information in your report:
- Type of vulnerability (e.g., XSS, SQL injection, remote code execution)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit/direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability and how an attacker might exploit it
- Acknowledgment: We'll acknowledge receipt of your report within 48 hours
- Updates: We'll provide regular updates on the progress of addressing the vulnerability
- Timeline: We aim to resolve critical vulnerabilities within 90 days
- Credit: We'll credit you in the security advisory (unless you prefer to remain anonymous)
- Security issue is reported and confirmed
- A fix is prepared in a private repository
- A new version is released with the fix
- A security advisory is published
- Users are notified to update
When using TomatoTask:
- Always download the application from official sources (GitHub releases)
- Keep your application updated to the latest version
- Review permissions requested by the application
- Report suspicious behavior immediately
The following are in scope for vulnerability reports:
- TomatoTask desktop application (Tauri)
- Frontend code (Svelte)
- Backend Rust code
- Build and release processes
The following are out of scope:
- Attacks requiring physical access to a user's device
- Social engineering attacks
- Denial of service attacks
- Issues in third-party dependencies (report these to the respective projects)
We support safe harbor for security researchers who:
- Make a good faith effort to avoid privacy violations and disruptions
- Only interact with accounts you own or with explicit permission
- Do not exploit vulnerabilities beyond the minimum necessary to demonstrate the issue
- Report vulnerabilities promptly
- Keep vulnerability details confidential until we've addressed them
We will not pursue legal action against researchers who follow these guidelines.
For any security-related questions or concerns, please contact the maintainers at snpepito@gmail.com.
Thank you for helping keep TomatoTask and its users safe!