| Version | Supported |
|---|---|
| 1.0.x | ✅ |
The NCSI Resolver project takes security seriously. We appreciate your efforts to responsibly disclose your findings.
To report a security vulnerability, please follow these steps:
- Do not disclose the vulnerability publicly
- Create a security advisory by going to the Security tab in the GitHub repository
- Provide details about the vulnerability, including:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested remediation if available
The project maintainers will:
- Acknowledge receipt of your vulnerability report as soon as possible
- Assess the impact and determine a fix
- Release a patch and acknowledge your contribution if applicable
NCSI Resolver is designed to run with administrative privileges on Windows systems as it:
- Modifies system registry entries
- Changes the hosts file
- Runs a web server on port 80
- Installs a Windows service
The project implements the following security measures:
- The web server only responds to specific NCSI endpoints
- All network operations use proper error handling
- The server verifies actual internet connectivity before responding
- No user data is collected or transmitted
- The code is open source and can be audited
When using NCSI Resolver:
- Always download from the official GitHub repository
- Check release signatures when available
- Review the code before installation if you have security concerns
- Run the latest version to ensure you have the most recent security fixes