We provide security updates for the following versions of WIC Editor:
Version | Supported |
---|---|
1.x.x | ✅ |
< 1.0 | ❌ |
We take security vulnerabilities seriously. Please report security vulnerabilities responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please send an email to: security@dynamicdevices.co.uk
Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fixes (if any)
- Acknowledgment: We'll acknowledge your report within 48 hours
- Initial Assessment: We'll provide an initial assessment within 5 business days
- Status Updates: We'll keep you updated on our progress
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Please allow us time to investigate and fix the vulnerability before public disclosure
- We'll credit you in our security advisories (unless you prefer to remain anonymous)
- We may contact you for additional information or clarification
- WIC Editor requires sudo privileges for mounting filesystems
- The script handles user input and file operations
- Always verify the source of WIC images before processing
- Be cautious with file paths and permissions
- Validate custom files before adding to images
- Use interactive mode when unsure about file overwrites
- WIC Editor doesn't make network connections
- Be careful when downloading WIC images from untrusted sources
- Verify checksums of downloaded images
- Always backup original WIC images
- Review file conflicts in interactive mode
- Use force mode (-f) only when necessary
- Validate custom files before deployment
- Keep WIC Editor updated to the latest version
- Run on secure, updated systems
For non-security issues, please use our GitHub Issues page. 7. Code of Conduct Create CODE_OF_CONDUCT.