We actively support the following versions of Everything Plus with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability in Everything Plus, please report it responsibly.
- Do NOT create a public GitHub issue for security vulnerabilities
- Email security concerns to: [email protected]
- Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any proof-of-concept code (if applicable)
- Your contact information
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Regular Updates: We will keep you informed of our progress throughout the investigation
- Resolution: We aim to resolve security issues within 90 days of disclosure
Everything Plus implements several security measures:
- Local Storage Only: All file indexes and metadata are stored locally
- No Cloud Transmission: No data is sent to external servers
- Encrypted Storage: Database files use SQLite's built-in security features
- File Permissions: Respects Windows file system permissions
- Sandboxed Execution: Runs with minimal required privileges
- Input Validation: All search queries are sanitized and validated
- Memory Safety: Rust's memory safety guarantees prevent common vulnerabilities
- Dependency Scanning: Regular audits of third-party dependencies
- No Elevated Privileges: Runs under user account permissions
- Safe File Operations: Read-only access to indexed files
- Registry Protection: Minimal Windows registry modifications
- Network Isolation: No network access required for core functionality
- Everything Plus requires read access to indexed directories
- Users should carefully consider which directories to index
- Sensitive directories can be excluded via settings
- File names and paths are displayed in search results
- Users in shared environments should be aware of potential information disclosure
- Hidden files are excluded by default but can be enabled
- The local SQLite database contains file metadata
- Database files should be protected with appropriate file system permissions
- Regular backups should be encrypted if stored externally
- Limit Indexed Directories: Only index directories you need to search
- Exclude Sensitive Paths: Add sensitive directories to the exclude list
- Regular Updates: Keep Everything Plus updated to the latest version
- Secure Backups: Encrypt database backups if stored externally
- Network Drives: Be cautious when indexing network-mounted drives
- Day 0: Vulnerability reported to security team
- Day 1-2: Acknowledgment and initial triage
- Day 3-7: Detailed investigation and impact assessment
- Day 8-30: Development of fix and testing
- Day 31-60: Release preparation and validation
- Day 61-90: Public disclosure and patch release
Security updates will be:
- Released as soon as possible after verification
- Clearly marked as security releases
- Accompanied by detailed changelogs (after responsible disclosure period)
- Available through the standard update mechanism
We regularly audit our dependencies for security vulnerabilities:
- React ecosystem packages
- Tailwind CSS and UI components
- Development and build tools
- Rust crates from crates.io
- System integration libraries
- Database drivers
- Automated vulnerability scanning with
cargo auditandnpm audit - Regular updates to latest stable versions
- Security patches applied promptly
For security-related inquiries:
- Email: [email protected]
- Response Time: Within 48 hours
For general issues:
- GitHub Issues: https://github.com/sebghatyusuf/everything-plus/issues
- Documentation: See README.md and docs/
We follow responsible disclosure practices and ask that security researchers do the same. We will not pursue legal action against researchers who:
- Report vulnerabilities in good faith
- Do not access or modify user data beyond what is necessary to demonstrate the vulnerability
- Do not violate any laws or regulations
- Do not disclose the vulnerability publicly until we have had reasonable time to address it
We believe in recognizing security researchers who help make Everything Plus more secure. With your permission, we will:
- Credit you in our security advisory
- Include your name in our release notes
- Provide a reference letter if requested
Thank you for helping keep Everything Plus and its users secure.