We actively support and provide security updates for the following versions:
| Version | Supported |
|---|---|
| 1.2.x | Yes |
| 1.1.x | Yes |
| 1.0.x | Limited support |
| < 1.0 | No |
This project implements several security measures:
- Archive Extraction: Uses safe extraction utilities to prevent directory traversal attacks
- Path Validation: All file paths are validated before processing
- Temporary Files: Secure temporary file creation and cleanup
- HTTPS Only: All downloads use HTTPS with certificate verification
- No Credentials: Application doesn't store or transmit user credentials
- Safe Downloads: FFmpeg binaries are downloaded from official sources only
- Command Injection Prevention: All user inputs are properly escaped and validated
- File Type Validation: Only supported video file types are processed
- Parameter Sanitization: FFmpeg parameters are sanitized before execution
- Isolated Execution: External processes run with minimal privileges
- Resource Limits: Conversion processes have reasonable resource constraints
- Clean Shutdown: Proper cleanup of processes and temporary files
If you discover a security vulnerability, please report it responsibly:
- DO NOT create a public GitHub issue for security vulnerabilities
- Email the maintainers privately at: [[email protected]] (replace with actual email)
- Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Suggested fix (if you have one)
- Acknowledgment: We will acknowledge receipt within 24-48 hours
- Initial Assessment: We will provide an initial assessment within 7 days
- Fix Development: We aim to develop fixes within 30 days for critical issues
- Public Disclosure: We will coordinate public disclosure after a fix is available
Critical (CVSS 9.0-10.0)
- Remote code execution
- Arbitrary file access outside intended directories
- Privilege escalation
High (CVSS 7.0-8.9)
- Local file inclusion/disclosure
- Command injection with limited scope
- Authentication bypass
Medium (CVSS 4.0-6.9)
- Information disclosure
- Denial of service
- Cross-site scripting (if web interface added)
Low (CVSS 0.1-3.9)
- Minor information leakage
- Non-exploitable crashes
- Configuration issues
- Always download from official sources
- Verify checksums when available
- Use virtual environments for Python dependencies
- Keep FFmpeg updated to latest stable version
- Don't process untrusted video files from unknown sources
- Review FFmpeg commands before execution
- Keep output directories within user-accessible areas
- Regularly update the application and dependencies
- Run with standard user privileges (not root/administrator)
- Use updated operating systems with current security patches
- Enable firewall protection
- Scan downloaded files with antivirus software
- We regularly update dependencies to address security vulnerabilities
- Use
pip-auditor similar tools to check for known vulnerabilities:pip install pip-audit pip-audit
- The application helps users download official FFmpeg binaries
- Users should verify FFmpeg signatures when possible
- We don't modify or redistribute FFmpeg binaries
- Updated safe extraction utilities
- Hardened HTTPS downloads with certificate verification
- Updated input validation and sanitization
- Added safe ZIP/TAR extraction utilities
- Implemented secure temporary file handling
- Added file size limits to prevent resource exhaustion
- Initial security implementation
- Basic input validation
- Safe external process execution
We welcome security research and responsible disclosure. Security researchers who follow our reporting guidelines will be credited in:
- Security advisories
- Release notes
- Public acknowledgments (with their permission)
For security-related questions or concerns:
- Security Team: [[email protected]]
- General Contact: [[email protected]]
- Emergency: For critical vulnerabilities requiring immediate attention
Remember: Security is a shared responsibility. Users should also follow security best practices when using this software.