| Version | Supported |
|---|---|
| 4.0.x | ✅ |
| < 4.0 | ❌ |
The XARF project takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
Please include the following information in your report:
- Type of vulnerability or security concern
- Affected specification version(s)
- Detailed description of the security issue
- Potential impact on implementations
- Suggested mitigation or fix (if applicable)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution: Depends on severity and complexity
- Triage: We'll confirm the vulnerability and assess severity
- Specification Review: We'll review affected specification sections
- Fix Development: We'll develop and review proposed changes
- Community Review: We'll engage with implementation maintainers
- Disclosure: We'll coordinate disclosure timing with you
- Publication: We'll publish updated specification with security notes
The specification recommends:
- Maximum 5MB per evidence item
- Maximum 15MB total evidence per report
- Implementations should enforce these limits
- All email fields must follow RFC 5322 format
- Implementations should validate email addresses
- Consider DNS MX record checks for untrusted sources
- All URL fields must be valid HTTP(S) URLs
- Implementations should sanitize URLs before processing
- Be cautious of URL schemes that could trigger code execution
- All timestamps must use ISO 8601 format with timezone
- Implementations should validate timestamp format
- Consider checking for unreasonable dates (far future/past)
Implementations should enforce reasonable limits on:
- String field lengths
- Array sizes (e.g., tags, attachments)
- Nested object depth
- Total report size
- Validate
categoryandtypeagainst allowed values - Reject unknown or invalid combinations
- Follow specification strictly for security-sensitive fields
- Input Validation: Validate all fields against schema
- Size Limits: Enforce maximum sizes to prevent DoS
- Type Safety: Use strong typing where possible
- Error Handling: Don't expose sensitive information in errors
- Sanitization: Sanitize all user-provided data
- Data Privacy: Don't include PII unless necessary
- Evidence Selection: Only include relevant evidence
- Size Management: Compress large evidence items
- Timestamp Accuracy: Use correct timezone information
- Field Validation: Validate before sending
- Trust Boundaries: Treat incoming reports as untrusted
- Validation: Validate against specification strictly
- Rate Limiting: Implement rate limits for report processing
- Storage: Secure storage for sensitive report data
- Access Control: Restrict access to report data
XARF reports may contain:
- Email addresses
- IP addresses
- Domain names
- Other identifying information
Recommendation: Implement appropriate data protection measures compliant with GDPR, CCPA, and other privacy regulations.
Evidence may include:
- Email headers and bodies
- Malicious payloads
- Network traffic dumps
- Log files
Recommendation: Sandbox evidence processing and storage. Never execute or render untrusted evidence without proper isolation.
The specification does not mandate cryptographic signatures for reports.
Recommendation: Implement additional authentication mechanisms (e.g., DKIM, S/MIME) when transmitting reports via email.
Reports transmitted over email or HTTP should be protected.
Recommendation: Use TLS for all network transmission. Consider end-to-end encryption for sensitive reports.
We follow a coordinated disclosure model:
- Private Disclosure: Report sent to contact@xarf.org
- Acknowledgment: We confirm receipt within 48 hours
- Investigation: We investigate with specification experts
- Community Review: We consult with implementation maintainers
- Specification Update: We publish updated specification
- Public Disclosure: We publish advisory 7 days after publication
We recognize security researchers who responsibly disclose vulnerabilities:
No vulnerabilities reported yet.
- Security Email: contact@xarf.org
- PGP Key: Not yet available
- GitHub Security Advisories: https://github.com/xarf/xarf-spec/security/advisories
Last Updated: 2025-11-30