Skip to content

Security: Vyntral/god-eye

Security

SECURITY.md

Security Policy

Responsible Use

God's Eye is a powerful security reconnaissance tool. With great power comes great responsibility.

Ethical Guidelines

DO:

  • Use for authorized penetration testing
  • Participate in bug bounty programs
  • Conduct security research on your own systems
  • Help improve security through responsible disclosure
  • Follow coordinated vulnerability disclosure processes

DO NOT:

  • Scan systems without explicit permission
  • Use for malicious purposes
  • Violate terms of service
  • Attempt unauthorized access
  • Sell or distribute scan results without authorization

Reporting Security Issues

Vulnerability Disclosure

If you discover a security vulnerability in God's Eye itself, please report it responsibly:

  1. DO NOT open a public issue
  2. Email the maintainers privately (see GitHub profile for contact)
  3. Provide detailed information:
    • Description of the vulnerability
    • Steps to reproduce
    • Potential impact
    • Suggested fix (if any)

Response Timeline

  • Acknowledgment: Within 48 hours
  • Initial Assessment: Within 7 days
  • Fix Development: Depends on severity
  • Public Disclosure: After fix is released

Security Best Practices

For Users

  1. Always verify authorization before scanning
  2. Keep the tool updated to latest version
  3. Use in controlled environments when testing
  4. Respect rate limits to avoid service disruption
  5. Secure your scan results - they may contain sensitive data

For Developers

  1. Review code changes for security implications
  2. Follow secure coding practices
  3. Test thoroughly before releasing
  4. Document security-relevant changes
  5. Never commit credentials or sensitive data

Compliance

Legal Requirements

Users must comply with:

  • United States: Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030
  • European Union: GDPR, ePrivacy Directive, NIS2 Directive
  • United Kingdom: Computer Misuse Act 1990
  • International: Budapest Convention on Cybercrime
  • Local laws: All applicable regional regulations

Bug Bounty Programs

When using God's Eye for bug bounty hunting:

  1. ✅ Read and follow program rules
  2. ✅ Respect scope limitations
  3. ✅ Avoid testing production systems unless explicitly allowed
  4. ✅ Report findings through proper channels
  5. ✅ Do not publicly disclose before program authorization

Data Protection

Handling Scan Results

Scan results may contain sensitive information:

  • Private IP addresses
  • Technology stack details
  • Potential vulnerabilities
  • Configuration information

Your Responsibilities:

  1. Store results securely
  2. Encrypt sensitive data
  3. Delete when no longer needed
  4. Do not share without authorization
  5. Comply with GDPR and data protection laws

Disclaimer

NO WARRANTY: This software is provided "AS IS" without warranty of any kind.

NO LIABILITY: The authors are not responsible for:

  • Misuse of this tool
  • Unauthorized access attempts
  • Legal consequences of improper use
  • Data breaches or security incidents
  • Any damages arising from use

USER RESPONSIBILITY: You are solely responsible for ensuring:

  • You have proper authorization
  • Your use complies with all laws
  • You accept all risks
  • You will not hold authors liable

Contact

For security-related questions:

  • Check the LICENSE file for legal terms
  • Review the README for usage guidelines
  • Contact maintainers through GitHub for private security reports

Remember: Unauthorized computer access is illegal. Always get permission first.

There aren’t any published security advisories