Skip to content

Security: nmicic/compartment

SECURITY.md

Security Policy

Supported Versions

Version Supported
1.0.x Yes

Reporting a Vulnerability

If you discover a security vulnerability in Compartment, please report it responsibly:

  1. Email: nenad@micic.be
  2. Subject: [SECURITY] compartment: <brief description>
  3. Include: steps to reproduce, affected version, potential impact

Please do not open a public GitHub issue for security vulnerabilities.

Response

  • Acknowledgment within 72 hours
  • Fix or mitigation within 30 days for confirmed vulnerabilities
  • Credit in release notes (unless you prefer anonymity)

Scope

In scope:

  • Sandbox escapes (Landlock, seccomp, namespace bypasses)
  • Privilege escalation via compartment-user or compartment-root
  • Environment variable injection past the sanitize filter
  • Profile parsing bugs that weaken the intended policy
  • Shell-replacement mode bypasses

Out of scope:

  • Bugs in the Linux kernel itself (report to kernel security team)
  • Attacks requiring pre-existing root access on the host
  • Denial of service against the sandboxed process (not a goal)

Known Limitations

See the README disclaimer and DESIGN.md for documented limitations, including:

  • No formal verification or professional penetration testing
  • Network egress bypass testing not yet automated for sandbox.sh HARD mode
  • compartment-root not tested under actual root (test suite runs rootless)

There aren't any published security advisories