| Version | Supported |
|---|---|
| >= 1.0 | ✅ |
| < 1.0 | ❌ |
Because this tool processes sensitive server logs (Apache/Nginx) using pandas, regex, and ipaddress, we focus on:
- Regular Expression Denial of Service (ReDoS): We use the
regexlibrary to mitigate some risks, but complex patterns inlog_parser.pymust be audited for catastrophic backtracking. - IP Address Validation: Using the
ipaddressmodule to prevent injection attacks or SSRF-related vulnerabilities when resolving or filtering log sources. - Data Leakage in Visualizations: Ensuring
visualizer.py(viaseaborn/matplotlib) does not inadvertently expose sensitive PII (Personally Identifiable Information) like full IP addresses in public reports if not intended. - Large File Vulnerability: Protecting
traffic_analyzer.pyfrom memory exhaustion (OOM) when loading massive.logfiles intopandasDataFrames.
Do not report security vulnerabilities via public GitHub issues.
- Private Report: Please use the GitHub Private Vulnerability Reporting feature.
- Email: Alternatively, contact [security@mscbuild.dev].
- Response: We aim to acknowledge all reports within 48 hours and provide a fix or mitigation within 14 days.
- Environment: Always use a virtual environment (
python -m venv venv). - Audit: Run
pip-auditregularly to checkpandasandnumpyfor known CVEs. - Privacy: If sharing
output/files, ensure you have anonymized sensitive log data.