We actively support and provide security updates for the following versions of Dragon's Dogma II Offline Setup Assistant:
| Version | Supported | Security Updates |
|---|---|---|
| 2.1.x | โ Yes | Full support |
| 2.0.x | โ Yes | Critical only |
| 1.9.x | Critical only | |
| 1.8.x | โ No | End of life |
| < 1.8 | โ No | End of life |
Gaming-Specific Security Concerns:
- Save file corruption or manipulation vulnerabilities
- Unauthorized access to game installation directories
- Configuration file injection attacks
- Memory manipulation exploits
- Network-based attacks on offline components
General Security Issues:
- Code execution vulnerabilities
- Privilege escalation
- Data exposure or leaks
- Authentication bypasses
- Input validation flaws
For Critical Vulnerabilities:
- DO NOT create a public GitHub issue
- Email us directly at:
security@dragons-dogma-ii-offline.github.io - Include detailed information about the vulnerability
- Provide steps to reproduce if possible
For Non-Critical Issues:
- Create a private security advisory on GitHub
- Use our security issue template
- Tag with appropriate severity level
Vulnerability Type: [Code Execution/Data Exposure/etc.]
Affected Component: [Setup Assistant/Config Tool/etc.]
Game Version Compatibility: [All/Specific versions]
Operating System: [Windows/Linux/macOS]
Severity Assessment: [Critical/High/Medium/Low]
Description:
[Detailed description of the vulnerability]
Steps to Reproduce:
1. [Step one]
2. [Step two]
3. [Step three]
Expected Behavior:
[What should happen]
Actual Behavior:
[What actually happens - security impact]
Potential Impact:
[Save corruption/System compromise/Data exposure/etc.]
Suggested Fix:
[If you have suggestions for mitigation]
| Severity | Initial Response | Investigation | Fix Release |
|---|---|---|---|
| Critical | 24 hours | 72 hours | 7 days |
| High | 48 hours | 5 days | 14 days |
| Medium | 5 days | 14 days | 30 days |
| Low | 7 days | 21 days | Next release |
- All operations are sandboxed to prevent save corruption
- Automatic backup creation before major configuration changes
- Integrity checks for modified game files
- Rollback mechanisms for failed operations
- Verification of game installation paths
- Protection against directory traversal attacks
- Validation of configuration file formats
- Safe handling of game binary modifications
- No network connections for core functionality
- Local-only configuration storage
- Encrypted sensitive settings
- Secure temporary file handling
- Download only from official sources
- Verify file checksums before installation
- Use dedicated game directories
- Regular backup of game saves and configurations
- Review configuration changes before applying
- Use separate profiles for experimental settings
- Monitor game behavior after modifications
- Keep original game files as backup
- Run with minimal required privileges
- Use updated antivirus software
- Monitor system for unusual behavior
- Regular security updates for OS and dependencies
- All code changes require security review
- Automated security scanning in CI/CD
- Regular dependency vulnerability audits
- Penetration testing for major releases
- Regular updates for security patches
- Vulnerability scanning of all dependencies
- Minimal dependency principle
- Vendor security assessment
Before Each Release:
- Static code analysis completed
- Dependency vulnerabilities checked
- Security test suite passed
- Code review with security focus
- Documentation updated for security features
For Major Features:
- Threat modeling completed
- Security architecture review
- Penetration testing conducted
- Security documentation updated
We recognize security researchers who help improve our project:
| Researcher | Vulnerability Type | Severity | Date |
|---|---|---|---|
| [Name] | [Type] | [Level] | [Date] |
Want to be listed here? Report a valid security vulnerability!
- Security Email: security@dragons-dogma-ii-offline.github.io
- General Contact: support@dragons-dogma-ii-offline.github.io
- Emergency: Use GitHub security advisories for urgent issues
- OWASP Gaming Security Guide
- Secure Gaming Development Practices
- Our Security Architecture Documentation
Protecting gamers and their data is our top priority! ๐ก๏ธ๐ฎ