We take security seriously. The following versions are currently supported with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
dicti0nary-attack is a security research tool designed for:
- ✅ Authorized penetration testing
- ✅ Security audits of owned systems
- ✅ CTF competitions
- ✅ Academic research
- ✅ Password strength analysis
Unauthorized use is illegal. This tool must only be used with explicit written permission.
DO NOT open public GitHub issues for security vulnerabilities.
Instead, report security issues via:
- Email: security@[project-domain] (if available)
- GitHub Security Advisories: Use the "Security" tab → "Report a vulnerability"
- Encrypted communication: PGP key available in
.well-known/security.txt
Please include:
- Description: Clear description of the vulnerability
- Impact: Potential security impact
- Reproduction: Steps to reproduce the issue
- Affected versions: Which versions are affected
- Suggested fix: If you have one
- Disclosure timeline: Your preferred disclosure timeline
We aim to:
- Acknowledge receipt within 48 hours
- Initial assessment within 7 days
- Fix development within 30 days for critical issues
- Public disclosure after fix is released (coordinated disclosure)
We use CVSS 3.1 scoring:
- Critical (9.0-10.0): Immediate attention, emergency patch
- High (7.0-8.9): High priority, patch within 30 days
- Medium (4.0-6.9): Standard priority, patch within 60 days
- Low (0.1-3.9): Low priority, patch in next release
This is a password cracking tool. Security considerations include:
-
Hash Algorithm Security
- We support multiple hash algorithms (MD5, SHA256, etc.)
- Some algorithms (MD5, SHA1) are cryptographically broken
- Use modern algorithms (SHA256+) for new implementations
-
Data Protection
- Never commit password hashes to version control
- Never commit cracked passwords to version control
- Use the
.gitignoreto exclude output directories - Clear output files after use
-
Access Control
- Run with minimum required permissions
- Do not run as root unless absolutely necessary
- Use virtual environments to isolate dependencies
-
Network Security
- This tool is offline-first by design
- No network calls in core functionality
- Web interface should be used on localhost only or behind authentication
- Parallel Processing: Multi-process cracking may consume significant CPU resources
- Memory Usage: Large wordlists may require significant RAM
- Output Files: Generated files may contain sensitive data - secure appropriately
- Authorization: Always obtain written permission before testing
- Data Handling: Treat all hashes and cracked passwords as sensitive data
- Environment: Use in isolated, controlled environments
- Logging: Disable logging of sensitive data in production
- Updates: Keep the tool updated for security fixes
We believe in coordinated disclosure:
- Report vulnerabilities privately
- Work with us to develop a fix
- Allow time for users to update
- Coordinate public disclosure
We will:
- Credit researchers in security advisories (unless you prefer anonymity)
- Maintain a security hall of fame for responsible disclosures
- Not pursue legal action against good-faith security researchers
Security updates are distributed via:
- GitHub Releases: Tagged releases with security fixes
- CHANGELOG.md: Security fixes documented
- Security Advisories: GitHub Security Advisories for critical issues
- Mailing list: (if established)
- Vulnerabilities in dicti0nary-attack code
- Security issues in dependencies
- Configuration issues leading to security problems
- Documentation issues that could lead to insecure usage
- Vulnerabilities in third-party dependencies (report to upstream)
- Issues in user-specific configurations
- Social engineering attacks
- Physical security issues
- Issues requiring unauthorized access to systems
We support good-faith security research. If you:
- Make a good faith effort to avoid privacy violations and data destruction
- Only interact with systems you have permission to test
- Report issues promptly and cooperate with remediation
- Do not publicly disclose issues before fixes are available
We will not initiate legal action and will work with you on coordinated disclosure.
- All dependencies must be pinned with integrity hashes
- Use automated security scanning (Bandit, Safety)
- Regular dependency updates via Dependabot
- Code review for all changes
- No secrets in source code
- Input validation for all user input
- Install from official sources only
- Verify package signatures
- Use virtual environments
- Run with least privilege
- Keep software updated
- Review configuration before use
- Security email: Create dedicated security@domain when available
- PGP key: See
.well-known/security.txt - Security advisories: GitHub Security tab
We maintain a security hall of fame for responsible disclosures:
(To be populated as vulnerabilities are responsibly disclosed)
Last updated: 2025-11-22 Policy version: 1.0