| Version | Supported |
|---|---|
| 1.0.x | Yes |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please email security concerns to: contact@micr.dev
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution Timeline: Depends on severity, typically 30-90 days
- We will work with you to understand and resolve the issue
- We will credit you in the release notes (unless you prefer anonymity)
- Please allow reasonable time for a fix before public disclosure
Undying Terminal supports optional XSalsa20 encryption via libsodium:
- Algorithm: XSalsa20 (256-bit key, 24-byte nonce)
- Note: Encryption provides confidentiality but not authentication (no MAC/AEAD)
For sensitive environments, we recommend:
- Enable encryption (
shared_key_hexin config) - Use strong random keys (32 bytes of random hex)
- Combine with VPN for defense-in-depth
- Restrict firewall to known IPs
- Sessions are authenticated via client ID + passkey
- Passkeys are transmitted in plaintext during initial handshake (use encryption!)
- Keep passkeys secure and rotate periodically
If exposing to the internet:
- Always enable encryption
- Use non-standard ports
- Implement firewall rules restricting source IPs
- Monitor for unauthorized connection attempts
- Consider binding to localhost and using VPN
-
Generate strong passkeys:
$bytes = New-Object byte[] 32 [Security.Cryptography.RNGCryptoServiceProvider]::Create().GetBytes($bytes) -join ($bytes | ForEach-Object { $_.ToString("x2") })
-
Rotate encryption keys periodically
-
Monitor server logs for suspicious activity
-
Keep Undying Terminal updated to receive security fixes