Version | Supported |
---|---|
24.04 | ✅ |
We prioritize the security of CyberPot highly. Often, vulnerabilities in CyberPot components stem from upstream dependencies, including honeypots, Docker images, tools, or packages. We are committed to working together to resolve any issues effectively.
Please follow these steps before reporting a potential vulnerability:
- Verify that the behavior you've observed isn't already documented as a normal aspect or unrelated issue of CyberPot. For example, Cowrie may initiate outgoing connections, or CyberPot might open all possible TCP ports—a feature enabled by Honeytrap.
- Clearly identify which component is vulnerable (e.g., a specific honeypot, Docker image, tool, package) and isolate the issue.
- Provide a detailed description of the issue, including log and, if available, debug files. Include all steps necessary to reproduce the vulnerability. If you have a proposed solution, hotfix, or patch, please be prepared to submit a pull request (PR).
- Check whether the vulnerability is already known upstream. If there is an existing fix or patch, include that information in your report.
This approach ensures a thorough and efficient resolution process.
We aim to respond as quickly as possible. If you believe the issue poses an immediate threat to the entire CyberPot community, you can expedite the process by responsibly alerting our CERT.