We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of NodeDaemon seriously. If you have discovered a security vulnerability in NodeDaemon, we appreciate your help in disclosing it to us in a responsible manner.
- DO NOT create a public GitHub issue for the vulnerability.
- Email your findings to security[at]nodedaemon.com. Encrypt your findings using our PGP key to prevent this critical information from falling into the wrong hands.
- Provide as much information as possible about the vulnerability:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
- We will acknowledge receipt of your vulnerability report within 48 hours.
- We will provide an estimated timeline for addressing the vulnerability.
- We will notify you when the vulnerability is fixed.
- We will publicly acknowledge your responsible disclosure, if you wish.
- The reported vulnerability is assigned a primary handler who coordinates the fix and release process.
- The problem is confirmed and a list of all affected versions is determined.
- Code is audited to find any potential similar problems.
- Fixes are prepared for all supported releases.
- New versions are released and the vulnerability is publicly disclosed.
When using NodeDaemon, follow these security best practices:
- Run NodeDaemon with minimal privileges
- Use separate user accounts for different applications
- Avoid running NodeDaemon as root/administrator
- Restrict access to NodeDaemon configuration files
- Set appropriate permissions on log directories
- Use 0600 permissions for Unix socket files
- Never store sensitive data in environment variables passed to processes
- Use secure methods for credential management
- Rotate credentials regularly
- Use firewall rules to restrict access to IPC endpoints
- Monitor for unauthorized connection attempts
- Keep NodeDaemon updated to the latest version
NodeDaemon implements several security features:
- Input Validation: All IPC messages are validated before processing
- Path Traversal Protection: File paths are sanitized to prevent directory traversal attacks
- Process Isolation: Each managed process runs in its own context
- Secure IPC: Unix sockets use restrictive permissions (0600)
- No External Dependencies: Reduces attack surface by using only Node.js built-in modules
- Security Email: [email protected]
- Website: https://nodedaemon.com
- GitHub: https://github.com/nodedaemon/nodedaemon