Skip to content

Security: myshkin42/worker-osint-toolkit

Security

.github/SECURITY.md

Security Policy

πŸ›‘οΈ Our Commitment

Worker safety and privacy are our highest priorities. This toolkit is designed to protect workers, not expose them. We take security vulnerabilities seriously and respond promptly.

πŸ“’ Reporting a Vulnerability

⚠️ DO NOT open a public issue for security vulnerabilities.

This could expose workers to risk or allow exploitation before fixes are deployed.

How to Report

Email: [TODO: Add your security email here]

Include in your report:

  1. Description: What is the vulnerability?
  2. Impact: How could this affect worker safety or privacy?
  3. Reproduction: Step-by-step instructions to reproduce
  4. Affected versions: Which versions are vulnerable?
  5. Suggested fix: If you have ideas (optional)
  6. Credit preference: How you'd like to be credited (optional)

What to Expect

  • Initial Response: Within 48 hours
  • Status Update: Within 7 days
  • Fix Timeline:
    • Critical (worker safety): 24-72 hours
    • High severity: 7-14 days
    • Medium severity: 30 days
    • Low severity: 60 days

Disclosure Policy

  • We practice coordinated disclosure
  • Vulnerabilities will be disclosed after fixes are deployed
  • You will be credited (unless you prefer anonymity)
  • We may request embargo period for critical issues

🎯 Scope

In Scope

  • The MCP server (osint_server.py)
  • Tool implementations in tools/ directory
  • Docker container security
  • Configuration handling
  • Data privacy leaks
  • OPSEC bypass techniques
  • Dependencies with known CVEs

Out of Scope

  • External APIs (report to the API provider)
  • Third-party tools (report to tool maintainers)
  • Social engineering attacks
  • Physical security
  • Theoretical vulnerabilities without proof of concept

πŸ” Supported Versions

Version Supported End of Support
1.x.x βœ… Yes TBD
< 1.0 ❌ No 2024-XX-XX

We support the latest major version. Security patches are backported to the previous major version for 6 months after a new major release.

🚨 Known Security Considerations

By Design

These are intentional aspects of the toolkit:

  1. Investigation Traces: All OSINT activities leave traces (IP logs, DNS queries, etc.)

    • Mitigation: Use VPN/Tor as documented in OPSEC guides
  2. Local Storage: Investigation results stored locally on user's machine

    • Mitigation: Users responsible for encrypting their systems
  3. API Keys: Some tools require API keys stored in environment variables

    • Mitigation: Never commit keys; use Docker secrets

Current Limitations

  1. Rate Limiting: Not all tools enforce rate limiting

    • Status: Planned for v1.1
    • Workaround: Manual delays between requests
  2. Tor Integration: Not fully implemented

    • Status: Planned for v1.2
    • Workaround: Use Tor Browser or external Tor proxy

πŸ› οΈ Security Best Practices

For Users

OPSEC Critical:

  • Always use VPN for investigations
  • Use dedicated devices/browsers
  • Clear history after each session
  • Never investigate from workplace networks
  • Encrypt your investigation results

Configuration:

  • Never commit API keys to git
  • Use environment variables or Docker secrets
  • Review .gitignore before commits
  • Keep Docker images updated

Privacy Levels:

  • Start with "conservative" privacy level
  • Understand traces left by each tool
  • Read OPSEC warnings before investigations

For Contributors

Code Review:

  • Check for hardcoded secrets
  • Validate all external input
  • Use type hints and validation
  • Include OPSEC considerations in tool docs

Dependencies:

  • Keep dependencies minimal
  • Use pinned versions in requirements.txt
  • Review dependency licenses
  • Update regularly for security patches

Testing:

  • Never commit test data from real investigations
  • Use mock/fake data in tests
  • Sanitize example outputs in docs

πŸ“Š Security Updates

How We Notify

Security fixes are announced via:

  1. GitHub Security Advisories (automatic for critical issues)
  2. Release Notes in CHANGELOG.md
  3. GitHub Discussions (if appropriate)

Update Process

# Check for updates
git fetch origin
git log HEAD..origin/main --oneline

# Update to latest
git pull origin main
docker build -t worker-osint-mcp:latest .

πŸ† Security Hall of Fame

We recognize researchers who help keep workers safe:

2024

  • [Waiting for first contributor!]

Thank you for making this toolkit safer for workers worldwide.

πŸ“š Additional Resources

OPSEC Guides

  • See docs/OPSEC_ADVANCED.md for comprehensive guidance
  • See docs/USAGE_GUIDE.md for tool-specific OPSEC

Security Tools

  • Bandit: Python security linter (runs in CI/CD)
  • Trivy: Container vulnerability scanning
  • Dependabot: Automated dependency updates

Learning Resources

βš–οΈ Legal Notice

This toolkit is for legitimate worker advocacy only. Using these tools to:

  • Harass or stalk individuals
  • Access systems without authorization
  • Violate privacy laws
  • Support anti-union activities

...is explicitly prohibited and may violate laws in your jurisdiction.

Worker safety and privacy always come first.

πŸ“ž Contact

  • Security issues: [TODO: security email]
  • General issues: GitHub Issues
  • Questions: GitHub Discussions
  • Emergency: If you've discovered an active attack on workers using this tool, email immediately with [URGENT] in subject

This security policy is part of our commitment to worker safety and solidarity. ✊

There aren’t any published security advisories