Skip to content

Security: Delta-Sec/SpyEye

SECURITY.md

🛡️ SpyEye Security Policy

The SpyEye team and the Delta-Security community take the security of this framework very seriously. We appreciate your efforts to responsibly disclose any vulnerabilities you may find.

📈 Supported Versions

Security is a rapidly evolving field, and to ensure the safety of our users, we are only able to provide security support and patches for the most recent stable version of the SpyEye framework.

Version Supported
main 2.3.0 (latest)
All previous versions

If you are not using the latest version, please upgrade before reporting a vulnerability to ensure it has not already been fixed.


✉️ How to Report a Vulnerability

PLEASE DO NOT DISCLOSE VULNERABILITIES PUBLICLY.

Do NOT open a public GitHub Issue for a security vulnerability. This can put other users of the tool at risk.

Instead, we ask that you report all security issues privately by emailing our security contact:

Please use a clear and descriptive subject line, such as "Security Vulnerability in SpyEye C2" or "ESP32 Probe Vulnerability Report".


📝 What to Include in Your Report

To help us validate and fix the vulnerability as quickly as possible, please include the following in your report:

  1. A Clear Description: A brief summary of the vulnerability and its potential impact.
  2. Affected Component: Specify which part of the framework is affected:
    • The Python C2 Host (e.g., flask_app.py, firewall.py, cli.py, etc.)
    • The ESP32 Probe (e.g., webserver.c, attack_pmkid.c, wsl_bypasser.c, etc.)
  3. Steps to Reproduce (PoC): A clear, step-by-step guide on how an attacker could exploit the vulnerability.
  4. Environment: Your operating system, Python version, and ESP-IDF version.
  5. (Optional) Suggested Fix: If you have an idea of how to fix the issue, please let us know.

⏳ Our Commitment (What to Expect)

When you report a vulnerability to us, you can expect the following:

  1. We will respond to your report promptly, typically within 48 hours, to acknowledge we have received it.
  2. We will conduct an internal investigation to confirm the vulnerability.
  3. We will work on a patch and prepare a new release.
  4. We will keep you updated on our progress and notify you once the vulnerability is patched.
  5. We will happily give you public credit (if you wish) in the release notes for your contribution to the security of the SpyEye community.

There aren’t any published security advisories