If you discover a security vulnerability in xhyprland (e.g., insecure scripts, exposed credentials, or malicious dependencies), please report it responsibly by contacting:
Email: x@xscriptor.com
When reporting a security issue, please provide:
- Description — A clear explanation of the vulnerability
- Type — What kind of security issue is it? (e.g., arbitrary code execution, permission escalation in scripts, etc.)
- Steps to Reproduce — Detailed steps to trigger the vulnerability
- Impact — How severe is the issue? What could an attacker do?
- Affected Scripts/Configs — Which files in xhyprland are affected?
- Proposed Fix (optional) — If you have a suggestion for how to fix it
- Do not open public GitHub issues for security vulnerabilities
- Do not disclose the vulnerability publicly until a fix is released
- Do give the maintainers reasonable time to address the issue before public disclosure
- Typically, we aim to respond within 7 days and release a fix within 30 days for critical issues
Since xhyprland deals with system configuration, keep these recommendations in mind:
- Keep updated — Always pull the latest version of xhyprland scripts (
git pull) to receive fixes - Review Scripts Before Running —
install.shand helper scripts run system commands. Always review them if you fork this repository. - Configuration Privacy — Be careful when sharing your personal configs, as they may contain sensitive paths, tokens, or personal identifiers.
- Third-party Tools — Only install Wayland tools and plugins from trusted package managers (like
pacmanoryay).
| Version | Status |
|---|---|
main branch |
Active |
Security fixes will be released as soon as possible. Critical vulnerabilities in the installation scripts will receive priority treatment.
Thank you for helping keep xhyprland secure!