Only the latest published version of decibri-cli receives security updates.
| Version | Supported |
|---|---|
| 0.1.x | Yes |
| < 0.1 | No |
Do not open a public issue for security vulnerabilities.
Report security issues privately through GitHub's built-in vulnerability reporting flow:
👉 https://github.com/decibri/decibri-cli/security/advisories/new
This opens a private advisory visible only to you and the repository maintainers. GitHub handles the coordinated-disclosure workflow end to end: draft the advisory, discuss the fix in a private fork if needed, request a CVE, and publish when ready.
Include in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix, if you have one
- Your preferred attribution (name and URL) or request for anonymity
- Acknowledgement within 7 days
- Initial assessment within 14 days
- A coordinated disclosure timeline agreed with the reporter
- Credit in the published advisory, unless you prefer anonymity
Every release binary is built via GitHub Actions and signed with a SLSA provenance attestation through Sigstore. You can verify any downloaded binary with the GitHub CLI:
gh attestation verify decibri-x86_64-unknown-linux-gnu.tar.gz --owner decibri
The attestation proves the binary was produced by this repository's release workflow from a specific commit. A failed verification means either a corrupted download, a binary from a different source, or tampering.
Every release includes a SHA256SUMS file in the GNU sha256sum format. Verify your download before extracting:
# Linux / macOS
sha256sum -c SHA256SUMS --ignore-missing
# Windows PowerShell
Get-FileHash decibri-x86_64-pc-windows-msvc.zip -Algorithm SHA256
The npm install -g decibri-cli flow performs this verification automatically on every install. Manual downloads should verify before running.
- No network access at runtime.
decibri-clidoes not connect to any remote service during capture, playback, or device enumeration. The only time the package touches the network is duringnpm install(downloading the binary from GitHub Releases) orcargo install(crates.io registry). - No file access outside user-specified paths. The binary reads and writes only files named in command-line arguments.
- No elevated permissions required. The binary runs as the invoking user. It does not request, use, or need any elevated privileges.
- SHA256-verified downloads in the npm wrapper. Before extracting, the postinstall script verifies the downloaded archive against the release's
SHA256SUMSmanifest. A mismatch triggers one re-download; a second mismatch aborts the install with a clear error. - No telemetry, analytics, or phone-home. The CLI does not collect or transmit any data.
- Unsigned Windows binaries. v0.1.x release binaries are not signed with an EV code-signing certificate. On first run, Windows SmartScreen may show a warning. This is not a security vulnerability; it reflects our decision to defer code-signing costs until user demand justifies them. Users who need signed binaries can build from source with
cargo install decibri-cli. - Unsigned macOS binaries. Same rationale — no Apple Developer signing or notarization in v0.1.x. macOS Gatekeeper warnings require
xattr -d com.apple.quarantine <path>on direct downloads. Thenpm install -gpath bypasses this.
Both limitations are roadmap items for v0.2.0 if the user base grows enough to justify the annual cost.