| Version | Supported |
|---|---|
| 0.3.x | Yes |
| < 0.3 | No |
Only the latest release receives security fixes.
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in Limbo, report it privately:
- Go to the GitHub Security Advisories page
- Click "Report a vulnerability"
- Fill in the details
Alternatively, you can contact the maintainer directly via GitHub.
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested mitigations (optional)
- Acknowledgement: within 3 business days
- Initial assessment: within 7 days
- Fix or mitigation: depends on severity and complexity
You will be kept informed of progress. If a CVE is warranted, we will coordinate disclosure together.
This policy covers the Limbo source code in this repository:
src/Limbo.Core— bypass engine, radar, DNS, ECH, monitoringsrc/Limbo.Driver— WinDivert P/Invoke wrappersrc/Limbo.Console— CLI applicationsrc/Limbo.GUI— WPF application
Out of scope:
- WinDivert itself (report to the WinDivert project)
- Third-party NuGet packages
- Vulnerabilities in the .NET runtime
Limbo requires Administrator privileges to operate (WinDivert kernel driver). Users should:
- Only download Limbo from the official repository
- Verify the SHA-256 checksum of downloaded release archives
- Run Limbo only in environments where you understand and accept the elevated privilege requirements
We follow responsible disclosure. Once a fix is ready:
- A patched release will be published
- A GitHub Security Advisory will be created
- The reporter will be credited (unless they prefer to remain anonymous)