Skip to content

Security: TideSurf/core

Security

SECURITY.md

Security Policy

Reporting a vulnerability

If you discover a security vulnerability in TideSurf, please report it responsibly.

Email: Open a GitHub Security Advisory (preferred) or email the maintainer directly.

Do not open a public issue for security vulnerabilities.

Scope

TideSurf runs Chrome via CDP. Security-relevant areas include:

  • Input validation — URLs, CSS selectors, JavaScript expressions, and file paths are validated before use.
  • Filesystem access — Upload and download operations are confined to allowed roots (cwd + tmpdir by default).
  • Read-only modereadOnly: true disables all write tools.
  • Injected JS — TideSurf injects JavaScript into pages for DOM marking. This code is static (no user input interpolation).

See the security documentation for details.

Supported versions

Version Supported
0.5.x Yes
< 0.5 No

There aren’t any published security advisories