Skip to content

Security: NexusOne23/noid-privacy-linux

Security

SECURITY.md

Security Policy

πŸ”’ Reporting Security Vulnerabilities

We take the security of NoID Privacy for Linux seriously. If you discover a security vulnerability, please follow responsible disclosure practices.

βœ… How to Report

DO NOT create a public GitHub issue for security vulnerabilities.

Instead, please report security issues via one of these methods:

  1. GitHub Security Advisory (Preferred)

  2. GitHub Discussions (Alternative)

    • Create a new discussion in the Security category
    • Mark it as "Private" if possible
    • Provide full details

πŸ“‹ What to Include

When reporting a vulnerability, please include:

  • Description: Clear description of the vulnerability
  • Impact: What can an attacker achieve?
  • Affected Versions: Which versions are affected?
  • Steps to Reproduce: Detailed reproduction steps
  • Proof of Concept: PoC code if applicable (optional)
  • Suggested Fix: If you have one (optional)

⏱️ Response Timeline (SLA)

Severity Acknowledgement Fix Target Max Resolution
Critical 24 hours 7 days 14 days
High 48 hours 14 days 30 days
Medium 7 days 30 days 60 days
Low 7 days 60 days 90 days

πŸŽ–οΈ Recognition

We appreciate responsible disclosure! Contributors will be:

  • Credited in the CHANGELOG (if desired)
  • Listed in the Security Hall of Fame (coming soon)

πŸ›‘οΈ Security Design Principles

NoID Privacy for Linux is designed with security in mind:

Audit-Only by Design

  • βœ… Read-Only: The script only reads system state β€” it never modifies your system
  • βœ… No External Dependencies: Zero third-party binaries, libraries, or package managers
  • βœ… Pure Bash: No Python, Ruby, Node.js, or compiled binaries
  • βœ… No Network Requests by Default: The script does not phone home or download anything. The vpn, interfaces, and netleaks sections make network requests (ping, dig, curl) to test connectivity, DNS, and VPN leaks. Skip them with --skip vpn --skip interfaces --skip netleaks for a fully offline audit.
  • βœ… No Data Collection: Zero telemetry, zero analytics, zero tracking

Code Transparency

  • βœ… Single File: One script, easy to read and audit
  • βœ… Open Source: Every line is inspectable on GitHub
  • βœ… No Obfuscation: Plain Bash, no encoded/minified code
  • βœ… Deterministic: Same system state = same output

πŸ“Š Supported Versions

Version Supported Notes
3.2.x βœ… Fully Supported Current release, 300+ checks, 42 sections
3.1.x ⚠️ Limited Support Upgrade to 3.2.x recommended
2.0.x ⚠️ Limited Support Upgrade to 3.0.x recommended
1.x ❌ Not Supported Legacy version

Recommendation: Always use the latest v3.x release.


πŸ” Security Best Practices for Users

Before Running

  1. βœ… Verify Script Integrity

    # Compare SHA256 hash against GitHub Release
    sha256sum noid-privacy-linux.sh
  2. βœ… Review the Code

    # It's one file β€” read it!
    less noid-privacy-linux.sh
  3. βœ… Check the Source

    • Download only from the official GitHub repository
    • Verify the URL: https://github.com/NexusOne23/noid-privacy-linux

During Execution

  • ⚠️ Requires root access (sudo) for comprehensive system checks
  • βœ… The script only reads β€” it does not modify any files or settings
  • βœ… All checks use standard Linux utilities (sysctl, ss, systemctl, etc.)

After Execution

  • βœ… Review the findings and fix issues manually or with AI assistance (--ai)
  • βœ… Re-run periodically to verify your hardening holds
  • βœ… Share reports with your team (no sensitive data in output by default)

🚨 Known Security Considerations

Root Access

  • ⚠️ The script requires sudo to read certain system files (e.g., /etc/shadow permissions, firewall rules)
  • βœ… Root access is used for reading only β€” no writes, no modifications
  • βœ… You can verify this: grep -c 'rm \|mv \|cp \|echo.*>\|tee \|sed -i\|install ' noid-privacy-linux.sh (should be 0 for system files)

Output Contains System Information

  • ⚠️ The audit output contains details about your system's security posture
  • βœ… Do not share raw output publicly if it reveals sensitive configuration
  • βœ… The --json output is designed for automated processing, not public sharing

πŸ” Code Quality

Static Analysis

  • ShellCheck: All code passes ShellCheck analysis
  • bash -n: Syntax validation in CI pipeline
  • Manual Review: Every PR is reviewed for security implications

Verification

Run checks yourself:

# Syntax check
bash -n noid-privacy-linux.sh

# ShellCheck (if installed)
shellcheck noid-privacy-linux.sh

Vulnerability Disclosures

No security vulnerabilities reported to date.


πŸ”— Related Projects

  • NoID Privacy β€” Windows 11 Security & Privacy Hardening Framework (sister project)

πŸ“„ License & Legal

  • License: GNU General Public License v3.0
  • Disclaimer: Use at your own risk. No warranties provided.
  • Audit-Only: This tool does not modify your system.

For licensing questions, see LICENSE or open a Discussion.


Last Updated: March 2, 2026 Policy Version: 1.3

There aren’t any published security advisories