We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in Tilde, please report it responsibly:
- Do NOT open a public GitHub issue for security vulnerabilities
- Send an email to the maintainer with detilde about the vulnerability
- Include as much information as possible:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggested fixes (if you have them)
- Response Time: We aim to acknowledge security reports within 48 hours
- Investigation: We will investigate and validate the reported vulnerability
- Fix Timeline: Critical vulnerabilities will be addressed as quickly as possible
- Disclosure: We will coordinate responsible disclosure once a fix is available
Tilde is a scripting language interpreter that can:
- Execute system commands through shell integration
- Make HTTP requests to external services
- Read and write files through script execution
When using Tilde:
- Only run trusted scripts from known sources
- Be cautious with scripts that make network requests
- Review scripts that interact with the file system
- Consider running untrusted scripts in sandboxed environments
- Script Review: Always review scripts before execution
- Trusted Sources: Only download scripts from trusted repositories
- Network Awareness: Be mindful of scripts that make external requests
- File Permissions: Understand what file operations a script performs
- Environment Isolation: Use containers or VMs for untrusted code
Thank you for helping keep Tilde and its users safe!