The following versions are currently being supported with security updates:
| Version | Supported |
|---|---|
| 0.x.x | Yes |
The netleak team takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings and will make every effort to acknowledge your contributions.
Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
To help us better understand the nature and scope of the security issue, please include as much of the following information as possible:
- Type of vulnerability (e.g., privilege escalation, BPF map manipulation, cgroup escape, etc.)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if available)
- Impact of the vulnerability, including how an attacker might exploit it
- Affected versions of netleak
- Kernel version and configuration used during testing
- Any special configuration required to reproduce the issue
Please use English for all communications.
- Initial Response: We aim to acknowledge receipt of your vulnerability report within 48 hours.
- Status Updates: We will send you regular updates about our progress, at least every 7 days.
- Disclosure Timeline: We aim to patch critical vulnerabilities within 90 days of the initial report.
- Acknowledgment: We will confirm receipt of your report within 48 hours
- Assessment: We will assess the vulnerability and determine its severity
- Communication: We will keep you informed of our progress
- Fix Development: We will develop a patch for the vulnerability
- Testing: We will test the fix thoroughly
- Disclosure: We will coordinate with you on the disclosure timeline
We use the following criteria to assess vulnerability severity:
- Critical: Privilege escalation, BPF program bypass, or kernel-level data corruption
- High: Kill-switch bypass, traffic leakage to unintended interfaces, cgroup escape
- Medium: Limited impact issues affecting specific kernel versions or configurations
- Low: Minor issues with minimal security impact
When we release a security fix:
- Private Patch: We first create a private patch
- Notification: We notify you and request validation of the fix
- Release: We release the patch in a new version
- Advisory: We publish a security advisory with details
- Credit: We credit you in the advisory (unless you prefer to remain anonymous)
- netleak loads eBPF programs into the kernel and requires root privileges
- BPF maps are pinned to
/sys/fs/bpfand shared across sessions - The kill-switch mechanism is enforced at the kernel level via cgroup-skb hooks
- BPF Map Manipulation: The cgroup policy map could be tampered with if bpffs permissions are misconfigured
- Cgroup Escape: Processes should not be able to leave the assigned cgroup
- Routing Table Tampering: Policy routing rules use a fixed fwmark and table ID
- Kill-Switch Bypass: The egress BPF program must always enforce the kill-switch when flagged
- Ensure
/sys/fs/bpfhas restrictive permissions - Run netleak only with the minimum required capabilities (CAP_SYS_ADMIN, CAP_NET_ADMIN, CAP_BPF)
- Verify cgroup v2 is properly configured and mounted
- Monitor kernel logs for unexpected BPF program detachments
Published security advisories can be found at:
- GitHub Security Advisories: https://github.com/MuriloChianfa/netleak/security/advisories
- Release Notes: https://github.com/MuriloChianfa/netleak/releases
We do not currently have a bug bounty program, but we deeply appreciate security research and will publicly acknowledge your contributions (with your permission).
We recognize security researchers who have helped improve netleak's security:
No security vulnerabilities have been reported yet.
If you have questions about this security policy, please email us at murilo.chianfa@outlook.com.
Thank you for helping keep netleak and its users safe!