Master Control is a local-first runtime that can inspect and mutate parts of a Linux host. Treat security issues in this repository as high-sensitivity reports even when the current release line is pre-1.0.
Out of scope for public issues:
- exploit details for unpatched vulnerabilities
- secrets, tokens, or host-specific private data
- reports that require publishing a proof-of-concept before maintainer review
Security fixes are only guaranteed for:
- the latest published pre-release
- the current
mainbranch
Older pre-releases may receive no fix or may only receive documentation updates.
Preferred path:
- Use GitHub private vulnerability reporting for this repository if it is enabled.
- If private reporting is unavailable, contact the maintainer privately before opening any public issue.
- Include reproduction steps, affected version or commit, impact, and any local configuration required to trigger the issue.
Do not open a public issue for a live security vulnerability before there is a maintainer response.
- affected commit, tag, or release
- exact command, workflow, or interface used
- expected behavior
- observed behavior
- impact assessment
- whether the issue depends on local configuration, environment variables, or host privileges
Target process for confirmed reports:
- Acknowledge receipt.
- Reproduce and assess impact.
- Prepare a fix or mitigation.
- Publish the fix and any required operator guidance.
Because the project is still pre-1.0, some fixes may land on main before a formal tagged release is cut.