Use this section to tell people about which versions of your project are currently being supported with security updates.
| Version | Supported |
|---|---|
| 1.2.x | ✅ |
| 1.1.x | ✅ |
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
- Email: Send details to security@example.com
- GitHub Security Advisory: Use GitHub's private vulnerability reporting feature
- Private Message: Contact maintainers directly
Please include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if any)
- Your contact information (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution: Within 30 days (depending on severity)
This app requires the following permissions:
SYSTEM_ALERT_WINDOW: Required for overlay displayFOREGROUND_SERVICE: Required for background monitoringACCESS_NETWORK_STATE: Required for network type detectionACCESS_WIFI_STATE: Required for WiFi state monitoringINTERNET: Required for network access
- No Data Collection: The app does not collect, store, or transmit any personal data
- Local Storage Only: All data is stored locally on the device
- No Network Communication: The app does not communicate with external servers
- No User Tracking: No analytics or tracking mechanisms
- Code Obfuscation: Release builds use ProGuard/R8 obfuscation
- Input Validation: All user inputs are validated
- Error Handling: Comprehensive error handling prevents crashes
- Memory Management: Proper resource cleanup prevents memory leaks
We are particularly interested in reports about:
- Permission Escalation: Unauthorized access to system permissions
- Memory Corruption: Buffer overflows or memory leaks
- Code Injection: Remote code execution vulnerabilities
- Data Exposure: Unintended data access or logging
- Denial of Service: App crashes or system instability
- Privacy Violations: Unauthorized data collection or transmission
The following are considered out of scope for security reports:
- UI/UX Issues: Cosmetic problems or usability issues
- Performance Issues: Slow performance or high resource usage
- Feature Requests: Requests for new functionality
- Third-party Libraries: Vulnerabilities in dependencies (report to respective maintainers)
- Keep your Android device updated
- Only install apps from trusted sources
- Review app permissions before granting
- Use device security features (screen lock, etc.)
- Follow secure coding practices
- Regular security audits
- Keep dependencies updated
- Use proper error handling
- Implement input validation
When we receive a security bug report, we will:
- Confirm the issue and determine affected versions
- Develop a fix for the latest version
- Test the fix thoroughly
- Release the fix in a new version
- Publicly disclose the vulnerability (if appropriate)
Security updates will be released as:
- Patch releases (e.g., 1.2.1) for critical security fixes
- Minor releases (e.g., 1.3.0) for security improvements
- Major releases (e.g., 2.0.0) for significant security changes
For security-related questions or concerns:
- Email: security@example.com
- GitHub: Use private vulnerability reporting
- Response Time: Within 48 hours
We appreciate the security research community and welcome responsible disclosure of vulnerabilities. Contributors who report valid security issues will be acknowledged in our security advisories (unless they prefer to remain anonymous).
This security policy is part of the project and is subject to the same license terms as the main project.