| Version | Supported |
|---|---|
| Latest Release | ✅ Full Support |
| Previous Release | |
| Older Versions | ❌ No Support |
We take security seriously. If you believe you have found a security vulnerability in Universal Device Toolkit, please report it responsibly through our coordinated disclosure process.
- Do NOT open a public GitHub issue
- Do NOT disclose the vulnerability publicly
- Do send a detailed report to: security@lenovolegiontoolkit.dev
Your report should include:
- Description of the vulnerability
- Steps to reproduce the issue
- Affected components or versions
- Potential impact assessment
- Suggested remediation (if any)
| Phase | Timeline |
|---|---|
| Initial Acknowledgment | 24 hours |
| Vulnerability Assessment | 3-5 business days |
| Fix Development | Based on complexity |
| Security Update Release | Coordinated disclosure |
- No Telemetry: UDT contains no data collection or tracking
- No Background Services: Application only runs when actively used
- Local-Only Operation: No cloud dependencies or remote servers
- Privacy-First Design: User data stays on the user's machine
UDT does NOT collect:
- ❌ Usage statistics
- ❌ Hardware identifiers
- ❌ Software inventory
- ❌ User behavior patterns
- ❌ Personal information
| Component | Security Measure |
|---|---|
| Plugin System | Isolated plugin load contexts + manifest/hash validation pipeline |
| Settings Storage | Local JSON files under user profile (no cloud sync) |
| Network Requests | HTTPS-only, certificate validation |
| Hardware Access | Minimal required permissions |
| Auto-Updates | HTTPS transport + integrity checks when hashes are provided |
Plugins run in dedicated load contexts and should be treated as trusted code:
- Validate plugin source before installation
- Prefer plugins with explicit manifest metadata and checksums
- Keep plugins updated and remove unused plugins
- Use least-privilege Windows account for daily usage
- NuGet Packages: Regularly updated
- Security Scanning: GitHub Dependabot enabled
- Vulnerability Alerts: Automatic notifications
- License Compliance: Review of all dependencies
| Dependency | Purpose | Security Note |
|---|---|---|
| .NET 10 | Runtime | Microsoft security updates |
| Autofac | DI Container | Mature, well-audited |
| System.Management | WMI/management APIs | Microsoft-maintained package |
| Octokit | GitHub API integration | Mature and widely used |
-
Download from Official Sources
- GitHub Releases only
- Verify checksum when possible
- Check digital signature
-
Permission Management
- Review requested permissions
- Run with minimal privileges
- Disable unused features
-
Plugin Safety
- Only install trusted plugins
- Review plugin permissions
- Keep plugins updated
-
Code Security
- All input validation
- No hardcoded credentials
- Secure string handling
- FxCop analyzers enabled
-
Dependency Updates
- Regular dependency audits
- Automated PRs for updates
- Security patches prioritized
-
Testing Requirements
- Security tests for hardware interfaces
- Plugin API validation
- Permission boundary tests
Some features require elevated permissions:
- WMI access for power management
- ACPI communication for firmware
- USB/HID access for RGB control
These are necessary for hardware control but increase the application's trust boundary.
The plugin system allows code execution. Users should:
- Only install plugins from trusted sources
- Review plugin permissions before installation
- Keep plugins updated
The update mechanism:
- Uses HTTPS for all downloads
- Verifies binary signatures
- Allows manual update rejection
- OWASP: Application security guidelines followed
- CWE: Common Weakness Enumeration awareness
- NIST: Cybersecurity framework considerations
- GDPR: No personal data collection
- CCPA: No data sale or sharing
- LGPD: No international data transfers
| Contact | Purpose |
|---|---|
| security@lenovolegiontoolkit.dev | Security vulnerability reports |
| support@lenovolegiontoolkit.dev | General support and issues |
| contributors@lenovolegiontoolkit.dev | Plugin developer questions |
We thank the security research community for helping us keep Universal Device Toolkit secure. Responsible disclosure allows us to address vulnerabilities before they affect users.
- Watch GitHub Releases for updates
- Enable auto-updates in settings
- Follow project announcements
Security updates are:
- Marked clearly in release notes
- Prioritized over feature releases
- Documented with CVE references (if applicable)
Last Updated: February 2026 Version: 1.0