Skip to content

Security: VIPHACKER100/VIPSQLi

Security

SECURITY.md

🔒 Security Policy

Supported Versions

Version Supported
4.x ✅ Active support
3.x ⚠️ Security fixes only
2.x ❌ End of life
1.x ❌ End of life

Reporting a Vulnerability

If you discover a security vulnerability in VIP SQLi Scanner itself (not in targets being scanned), please follow responsible disclosure:

  1. Do NOT open a public issue.
  2. Email: Send details to viphacker100@proton.me
  3. Include:
    • Description of the vulnerability
    • Steps to reproduce
    • Potential impact
    • Suggested fix (if any)

Response Timeline

Action Timeline
Acknowledgment Within 48 hours
Initial assessment Within 1 week
Fix release Within 2 weeks (critical)
Public disclosure After fix is released

Scope

In Scope

  • Authentication bypass in the dashboard
  • SQL injection in the dashboard's own database queries
  • Remote code execution via payloads or plugins
  • Unauthorized data access via API endpoints
  • Dependency vulnerabilities

Out of Scope

  • Vulnerabilities in scan targets (that's the scanner's job!)
  • Social engineering attacks
  • Physical security
  • Issues in third-party services (Slack, Jira, AWS)

Safe Harbor

We support safe harbor for security researchers who:

  • Act in good faith
  • Avoid impacting other users
  • Report vulnerabilities responsibly
  • Do not exploit vulnerabilities beyond verification

EST 2026 · viphacker100 (Aryan Ahirwar)

There aren’t any published security advisories