Glass currently ships a replay-first bounded showcase. Security reports are most useful when they affect code or assets that actually ship in this repo, especially:
- share-safe pack export and sanitization
.glass_packparsing and validation insession_engine,tools/glass-pack, and the viewer- loopback bridge auth or the optional local
?live=1shell - committed fixtures, scripts, or docs that could leak secrets or encourage unsafe handling
Out of scope for the current repo claim:
- long-horizon/spec-only material under
docs/long-horizon/ - production ingest scale, cloud hosting, or final F-IPC transport not shipped here
- purely local developer environment mistakes that do not create a repo-level issue
Do not post exploit details or sensitive payloads in a public issue.
Preferred path:
- Use GitHub private vulnerability reporting / security advisories for this repository if it is enabled.
- Include the affected commit or branch, impact, reproduction steps, and whether the issue can leak data from a
.glass_packor local bridge session.
Fallback if private reporting is unavailable:
- Open a minimal public issue requesting a private contact path.
- Do not include secrets, exploit payloads, or private data in that public issue.
- Triage focuses on the shipped bounded showcase first.
- Issues in provisional or long-horizon paths are still useful, but they should be labeled honestly.
- Coordinated disclosure is preferred once a fix or mitigation exists.