If you discover a security vulnerability in QP Tunnel, please report it responsibly.
Email: security@quantumpipes.com
What to include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Response timeline:
- Acknowledgment within 48 hours
- Initial assessment within 7 days
- Fix or mitigation plan within 30 days
Security reports are accepted for:
- Command injection or code execution vulnerabilities
- Key material exposure (private keys logged, leaked, or improperly permissioned)
- Audit log bypass or tampering
- Input validation bypass
- Cryptographic weaknesses in how WireGuard is configured
- Privilege escalation
- WireGuard protocol vulnerabilities (report to the WireGuard project)
- DigitalOcean API issues (report to DigitalOcean)
- Social engineering attacks
- Denial of service via resource exhaustion
| Version | Supported |
|---|---|
| 0.1.x | Yes |
QP Tunnel follows these security principles:
- All keys generated with umask 077 (owner-only permissions)
- Private keys never appear in logs, terminal output, or audit trails
- Input validation rejects all characters outside
[a-zA-Z0-9_-] - Zero use of
evalin the entire codebase - API tokens masked in all log output
set -euo pipefailin every script- ERR trap ensures failures are recorded in the audit trail
- Revoked peers are archived, never deleted (audit compliance)
Copyright 2026 Quantum Pipes Technologies, LLC.