VI Software takes the security of VIS Launcher seriously. As a launcher that handles user authentication, manages mod installations, and connects to VI Software services, we recognize our responsibility to protect our users' systems and data.
VIS Launcher follows a structured release policy with three channels. Security support varies by channel:
| Release Channel | Security Support | Recommended For |
|---|---|---|
| Annual Stability Release (ASR) | Security patches & critical bug fixes during support window | Production use |
| Nightly / Stable (no ASR) | Best-effort security fixes | Testing & early adopters |
| Canary | No security guarantees* | Developers & testing only |
*Should still be reported so they dont make it to a production branch
For information about the current ASR, support windows, and detailed release policy, see our Release Policy documentation.
- Current ASR: Receives all security patches and critical bug fixes during its support window
- Previous ASR: Once a new ASR is released, the previous ASR immediately enters end-of-life and no longer receives security updates
- Nightly/ Stable (no ASR) / Canary: Development channels receive security fixes on a best-effort basis as part of ongoing development
We strongly recommend using the current ASR for any production or daily-use scenarios.
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in VIS Launcher, please report it responsibly by emailing security ( at ) visoftware ( dot ) dev with:
- Description: Clear explanation of the vulnerability
- Impact: What an attacker could potentially do
- Steps to Reproduce: Detailed steps to reproduce the issue
- Affected Versions: Which versions are affected
- Environment Details: OS, Java version, launcher version
- Proof of Concept: Code, screenshots, or logs (if applicable)
- Suggested fix or mitigation
- CVE number (if already assigned)
- Any relevant context or discoveries
- Initial Response: Within 48-72 hours acknowledging receipt
- Status Updates: Regular updates on our investigation and remediation progress
- Resolution Timeline:
- Critical vulnerabilities: Expedited patch within 7-14 days
- High severity: Patch within 30 days
- Medium/Low severity: Included in next regular release cycle
- ASR Backporting: Critical and high-severity vulnerabilities will be backported to the current ASR branch
- Credit: With your permission, we'll acknowledge your contribution in release notes
Security issues in VIS Launcher that could lead to:
Critical Severity:
- Remote Code Execution (RCE)
- Authentication bypass or credential theft
- Arbitrary file write/read outside launcher directory
- Privilege escalation on user's system
- Man-in-the-middle attacks on launcher updates or mod downloads
High Severity:
- Denial of Service (DoS) affecting launcher functionality
- Client-side injection vulnerabilities (XSS in renderer process)
- Insecure update mechanisms
- OAuth token theft or session hijacking
- Unauthorized access to VI Software services
Medium/Low Severity:
- Information disclosure (configuration, system details, logs)
- Path traversal vulnerabilities
- Insecure temporary file handling
- Weak cryptographic implementations
- Dependency vulnerabilities with proven exploitability
The following are not considered security vulnerabilities:
- Issues requiring physical access to the user's machine
- Social engineering attacks (phishing, impersonation)
- Vulnerabilities in third-party dependencies without proof of impact on VIS Launcher
- Issues in VI Software backend services (report to VI Software directly)
- Minecraft server vulnerabilities
- Mod-specific vulnerabilities (report to mod authors)
- Browser/Electron framework vulnerabilities (unless we're using an outdated version)
- Theoretical vulnerabilities without practical exploitation path
- Issues already reported or publicly known
- Rate limiting or brute force on VI Software servers
- Missing security best practices without proven vulnerability
- Crashes or bugs that don't have security implications
VIS Launcher implements several security measures:
- OAuth 2.0 and Yggdrasil authentication with secure token handling
- User credentials are transmitted directly to VI Software servers and never stored locally
- Validation of downloaded files before execution
- Security patches delivered through automatic launcher updates
- Electron security features to isolate renderer processes
- All communication with VI Software services over encrypted channels
- Report Received: We acknowledge your report within 48-72 hours
- Investigation: We verify and assess the severity of the vulnerability
- Development: We develop and test a fix on the main/nightly branch
- Internal Testing:
- Canary builds are created for immediate CI/CD testing
- Pre-release builds are generated for broader testing
- Release:
- Critical/High severity: Expedited release to all supported channels
- ASR receives backported security patch (e.g.,
2.1.1-asrβ2.1.2-asr) - Nightly/Pre-release receives fix in next build
- Public Disclosure: After patch deployment and user notification (typically 7-30 days post-release)
- Credit: Reporter is credited in release notes and security advisories (if desired)
Critical Security Vulnerabilities:
- π‘ Canary: Immediate fix deployed for validation
- π΅ Nightly/Pre-release: Released within 24-48 hours after canary validation
- π’ ASR: Emergency patch released within 7-14 days
High Severity Vulnerabilities:
- π‘ Canary: Fix deployed in next CI/CD build
- π΅ Nightly/Pre-release: Included in next scheduled build (usually within days)
- π’ ASR: Backported and released within 30 days
Medium/Low Severity:
- π‘ Canary: Fixed as part of regular development
- π΅ Nightly/Pre-release: Included in normal release cycle
- π’ ASR: Evaluated for backporting; included if impact is significant
For more details on our release channels and branching strategy, see our Release Policy documentation.
We request that security researchers:
- Allow us reasonable time (30-90 days) to patch before public disclosure
- Do not exploit vulnerabilities beyond proof-of-concept
- Do not access, modify, or delete other users' data
- Make a good faith effort to minimize privacy violations
At this time, VI Software does not offer a monetary bug bounty program. However, we deeply appreciate security research contributions and will:
- Publicly acknowledge contributors (with permission)
- Provide recognition in our Hall of Fame (coming soon)
- Consider contributions for future community recognition programs
To keep your VIS Launcher installation secure:
- Use the ASR Channel: For production and daily use, always use the current Annual Stability Release (ASR). Check the Release Policy for the current ASR version.
- Keep Updated:
- ASR users: Install security patches when released
- Nightly users: Enable automatic updates to receive fixes quickly
- Canary users: Expect frequent updates; only use for testing
- Download from Official Sources: Only download from visoftware.dev or GitHub Releases
- Verify Release Channel: Ensure you're on the correct channel for your use case. Check your version string in the launcher for channel indicators.
- Monitor Security Advisories: Watch GitHub Security Advisories for VIS Launcher
- Report Suspicious Activity: Contact us if you notice unusual launcher behavior
- Use Strong Passwords: Secure your VI Software account with a strong, unique password
- Enable 2FA: If available, enable two-factor authentication on your account
- From Canary to Nightly: When you want more stability but still want new features
- From Nightly to ASR: When the new ASR is released (recommended for all users)
- From old ASR to new ASR: As soon as the new ASR is released (old ASR stops receiving security updates)
We thank the following security researchers for responsibly disclosing vulnerabilities:
This section will be updated as we receive and address security reports.
- Security Issues: security ( at ) visoftware ( dot ) dev
- General Support: Documentation
- Bug Reports: GitHub Issues
Note: This security policy applies specifically to the VIS Launcher client application. For security issues related to VI Software's backend services, authentication systems, or web infrastructure, please refer to VI Software's main security policy.
Last Updated: November 2025