ReconMaster is designed for authorized security testing and ethical hacking only. By using this tool, you agree to:
- Only scan infrastructure you own or have explicit, documented permission to test.
- Adhere to all local, state, and international laws regarding cybersecurity and data privacy.
- Avoid causing disruption or damage to any system or network.
The author assumes no liability for any misuse, damage, or illegal activities performed with this tool.
ReconMaster v3.2.0-Elite implements several internal security controls:
- Sensitive Data Redaction: Log filters automatically redact API keys (Censys, SecurityTrails, VirusTotal, Google, AWS, GitHub, etc.) and passwords.
- Circuit Breaker v2: Protects against WAF blocking and rate limiting by auto-throttling requests.
- Path Traversal Protection: All file writes are sandboxed using strict path verification.
- Command Injection Protection: Defensive sanitization of dynamic inputs used in shell commands.
- Internal Infrastructure Guard: Built-in blocks prevent accidental scanning of localhost or private networks.
- Authorization Verification: Mandatory flag to confirm scan authorization.
If you discover a security issue in ReconMaster itself, please report it responsibly:
- Open a private issue on GitHub (if available) or contact the author directly at GitHub Profile.
- Provide a detailed description of the vulnerability and steps to reproduce it.
- Allow reasonable time for the author to address the issue before public disclosure.
Thank you for helping keep ReconMaster secure!
Last Updated: February 10, 2026