| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability in LASS, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities
- Email security concerns to: security@example.com (replace with actual email)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution Timeline: Depends on severity
- Critical: 24-72 hours
- High: 7 days
- Medium: 30 days
- Low: 90 days
We consider security research conducted in accordance with this policy to be:
- Authorized
- Lawful
- Helpful
We will not pursue legal action against researchers who:
- Act in good faith
- Avoid privacy violations
- Do not destroy data
- Report findings promptly
When using LASS:
- Run with least privilege: Only use root when necessary
- Protect reports: Scan results contain sensitive information
- Secure baselines: Baseline files may reveal security posture
- Audit regularly: Run scans periodically, not just once
- Update frequently: Keep LASS updated for latest checks
LASS is a detection tool, not a prevention tool:
- Cannot block attacks
- May miss sophisticated threats
- Results require human interpretation
- Some checks need root for full visibility