We actively support the following versions of hybar with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
As a World of Warcraft addon, hybar operates within WoW's sandboxed Lua environment, which provides inherent security limitations:
- Limited Attack Surface: WoW addons cannot access the filesystem, execute system commands, or make arbitrary network requests
- API Restrictions: Only WoW-approved APIs are available
- Client-Side Only: All code runs locally in the game client
However, we still take security seriously for:
- Lua code injection vulnerabilities
- Malicious behavior through WoW API misuse
- Privacy concerns with saved variables
- Social engineering through addon distribution channels
If you discover a security vulnerability in hybar, please help us maintain the security of our users by reporting it responsibly.
Please do NOT create a public GitHub issue for security vulnerabilities.
Instead, report vulnerabilities privately through one of these methods:
-
GitHub Security Advisories (Preferred)
- Go to the Security tab
- Click "Report a vulnerability"
- Provide detailed information about the vulnerability
-
Email
- Send to: cam@raincamp.ai
- Subject line:
[SECURITY] hybar vulnerability report - Include detailed reproduction steps and impact assessment
Please include the following information in your report:
- Description: Clear description of the vulnerability
- Impact: What could an attacker accomplish?
- Reproduction Steps: Detailed steps to reproduce the issue
- WoW Version: Which version(s) of WoW are affected
- Addon Version: Which version(s) of hybar are affected
- Proof of Concept: Code snippets or screenshots if applicable
- Suggested Fix: If you have ideas for remediation (optional)
- Initial Response: Within 48-72 hours of receipt
- Vulnerability Assessment: Within 1 week
- Fix Timeline: Varies based on severity and complexity
- Critical: As soon as possible
- High: Within 2 weeks
- Medium/Low: Next release cycle
We follow coordinated disclosure principles:
- You report the vulnerability privately
- We confirm receipt and assess the issue
- We develop and test a fix
- We release the fix in a new version
- We publicly credit you in the release notes (unless you prefer to remain anonymous)
- After the fix is released and users have had time to update (typically 30 days), we may publish a security advisory
We appreciate security researchers who help keep hybar safe. We're happy to:
- Credit you in release notes and the security advisory
- Thank you in our README (if desired)
- Recognize your contribution in our community channels
Thank you for helping keep hybar and its users safe!