reeln-dock is pre-release software and has not yet published a public
release. Until version 0.1.0 ships, security fixes will land on the
main branch. Once releases begin, this table will be updated to track
the supported minor versions.
| Version | Supported |
|---|---|
main (pre-release) |
✅ |
reeln-dock is a cross-platform desktop companion app for the reeln
ecosystem, built with Tauri 2 (Rust backend + Svelte frontend). It runs
locally on a user's machine and provides visual render profiles, clip
review, and game management on top of reeln-cli and reeln-core.
In-scope concerns include, but are not limited to:
- Tauri IPC command injection — unsafe handling of arguments passed from
the frontend to Rust
#[command]handlers - Path traversal or unsafe file handling in game directories, render output paths, or configuration files
- Cross-site scripting (XSS) in the Svelte frontend via unescaped game metadata, clip titles, roster data, or plugin-supplied strings
- Unsafe
tauri-plugin-shellortauri-plugin-dialoginvocations that could execute arbitrary commands or open unintended files - Memory safety issues in the Rust backend (
src-tauri/), includingunsafeblocks and FFI boundaries withreeln-core - Unsafe deserialization of game state, render manifests, or plugin profiles (JSON / TOML)
- Credential leakage from plugin profiles (OAuth tokens, API keys) via logs, error messages, or frontend state
Out of scope:
- Vulnerabilities in Tauri, Svelte, or third-party crates — report those to the respective upstream project
- Vulnerabilities in
reeln-cli,reeln-core, or individual reeln plugins — report those to the respective repository - Issues that require an attacker to already have local code execution on the user's machine
Please do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.
Report vulnerabilities using GitHub's private vulnerability reporting:
- Go to the Security tab of this repository
- Click "Report a vulnerability"
- Fill in as much detail as you can: affected version or commit, reproduction steps, impact, and any suggested mitigation
If you cannot use GitHub's reporting, email git-security@email.remitz.us instead.
A good report contains:
- The commit SHA or branch you tested against (reeln-dock is pre-release, so there are no version numbers yet)
- Your operating system and architecture (macOS / Windows / Linux, arch)
- Steps to reproduce the issue
- What you expected to happen vs. what actually happened
- The potential impact (credential leakage, code execution, XSS, data loss, denial of service, etc.)
- Any proof-of-concept code, if applicable
reeln-dock is maintained by a small team, so all timelines below are best-effort rather than hard guarantees:
- Acknowledgement: typically within a week of your report
- Initial assessment: usually within two to three weeks, including whether we consider the report in scope and our planned next steps
- Status updates: roughly every few weeks until the issue is resolved
- Fix & disclosure: coordinated with you. We aim to land a fix on
mainreasonably quickly for high-severity issues, with lower-severity issues addressed in a future commit or release. Credit will be given in the commit message, release notes, or CHANGELOG unless you prefer to remain anonymous.
If a report is declined, we will explain why. You are welcome to disagree and provide additional context.