Only the latest release on the master branch receives security fixes. Older tagged releases are not patched.
| Version | Supported |
|---|---|
| v1.0.0-beta.1 | Yes |
This policy covers vulnerabilities in pxSentinel itself, for example:
- A bypass technique that allows a malicious resource to evade detection
- A false-positive class that could cause pxSentinel to stop a legitimate resource
- A logic flaw in the
onResourceFsPermissionViolationhandler that could be exploited by a backdoor to silence alerts - Any issue with the Discord webhook dispatch that could leak the webhook URL
Reports about third-party backdoors or malicious resources found on your server are not security vulnerabilities in pxSentinel. Please open a standard issue or pull request to contribute new signatures to blocked.lua instead. See the contribution notes in the README.
Do not open a public GitHub issue for security vulnerabilities. Doing so exposes the bypass technique before a fix is available and gives backdoor authors time to adapt.
Please report privately using one of the following methods:
-
GitHub private vulnerability reporting (preferred): Use the Security - Report a vulnerability button on the repository page. This opens a private advisory draft visible only to maintainers.
-
Direct contact: If you are unable to use GitHub's reporting tool, reach out via the contact details on codemeapixel.dev.
Please include the following in your report:
- A clear description of the vulnerability and its impact
- Steps to reproduce or a minimal proof-of-concept
- The version or commit hash you tested against
- Any suggested fix, if you have one
| Step | Target Timeframe |
|---|---|
| Acknowledgement | Within 48 hours |
| Initial triage and severity assessment | Within 5 days |
| Fix development and testing | Depends on complexity |
| Patch release and public advisory | Coordinated with reporter |
We follow a coordinated disclosure model. Once a fix is released, a public GitHub Security Advisory will be published crediting the reporter unless anonymity is requested.
The following are not considered vulnerabilities in pxSentinel:
- A backdoor that pxSentinel does not currently detect. Please contribute a signature via pull request instead.
- Social engineering or phishing attacks targeting server administrators
- Vulnerabilities in FiveM, txAdmin, or third-party resources that pxSentinel cannot mitigate
- The intentional behaviour of
Config.StopResourcestriggering a kill-switch. This risk is documented in the README and is a deliberate design trade-off.