| Version | Supported |
|---|---|
| 4.0.x | ✅ |
| < 4.0 | ❌ |
The XARF project takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
Please include the following information in your report:
- Type of vulnerability (e.g., XSS, CSRF, injection, information disclosure)
- Affected page(s) or URL(s)
- Steps to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including potential attacker capabilities
- Browser and version used for testing (if applicable)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity and complexity
- Triage: We'll confirm the vulnerability and assess severity
- Fix Development: We'll develop and test a fix
- Disclosure: We'll coordinate disclosure timing with you
- Deployment: We'll deploy the fix to production
- Announcement: We'll publish a security advisory
The XARF website is a static site hosted on GitHub Pages, which provides inherent security benefits:
- No server-side code execution
- No database to compromise
- No user authentication system
- Minimal attack surface
- All content is version-controlled in Git
- Changes require review via pull requests
- Automated checks on all commits
- Branch protection on main branch
- All traffic is encrypted via TLS
- HTTP automatically redirects to HTTPS
- HSTS headers enabled
- Cloudflare SSL/TLS protection
The website implements Content Security Policy (CSP) headers to prevent:
- Cross-Site Scripting (XSS)
- Code injection attacks
- Data injection attacks
All external resources (CSS, JavaScript) use Subresource Integrity (SRI) checks when possible.
The website displays XARF examples and documentation. All examples are:
- Sanitized before publication
- Reviewed for malicious content
- Validated against XARF specification
External links are:
- Reviewed before publication
- Use
rel="noopener noreferrer"where appropriate - Regularly checked for validity
We minimize JavaScript usage. When used:
- All scripts are reviewed for security
- No eval() or similar dangerous functions
- Input validation on any user interactions
The website may use:
- Google Analytics (optional)
- Cloudflare CDN and security
- GitHub Pages hosting
We regularly review third-party service security and privacy policies.
As a static site, we cannot:
- Implement server-side rate limiting
- Block malicious traffic at origin
- Log security events server-side
Mitigation: We rely on Cloudflare for these protections.
GitHub Pages has specific limitations:
- Custom server headers limited
- No server-side authentication
- No server-side logging
Mitigation: We use client-side security measures and Cloudflare.
Code examples may contain:
- Sample abuse report data
- Example IP addresses
- Fictional email addresses
Mitigation: All examples use reserved IP ranges (RFC 5737) and example.com domains.
We follow a coordinated disclosure model:
- Private Disclosure: Report sent to contact@xarf.org
- Acknowledgment: We confirm receipt within 48 hours
- Investigation: We investigate and develop a fix
- Fix Deployment: We deploy the fix to production
- Public Disclosure: We publish advisory 7 days after deployment
- Use HTTPS: Always access https://xarf.org (automatically enforced)
- Keep Browser Updated: Use the latest browser version
- Verify URLs: Ensure you're on the official xarf.org domain
- Report Issues: Contact us if you notice suspicious activity
- Review Changes: Carefully review all changes in pull requests
- Sanitize Examples: Don't include real abuse data in examples
- Secure Development: Use secure development practices
- Update Dependencies: Keep Jekyll and dependencies updated
We recognize security researchers who responsibly disclose vulnerabilities:
No vulnerabilities reported yet.
Currently, we do not offer a bug bounty program. However, we deeply appreciate security research and will publicly acknowledge your contribution.
- Security Email: contact@xarf.org
- PGP Key: Not yet available
- GitHub Security Advisories: https://github.com/xarf/xarf-website/security/advisories
Last Updated: 2025-11-30