Skip to content

Security: 21-DOT-DEV/swift-tor

SECURITY.md

Security Policy

Reporting a Vulnerability

To report a security vulnerability in swift-tor, please use GitHub Security Advisories.

Do not file a public issue.

When reporting, please include:

  • A description of the vulnerability
  • Steps to reproduce or a proof of concept
  • Potential impact assessment (including anonymity impact, if applicable)

We will acknowledge receipt within 7 days and provide an initial assessment as soon as possible.

Supported Versions

This package is pre-1.0 (SemVer major version zero). Only the latest minor release receives security fixes.

Version Supported
0.1.x

Threat Model & Responsible Use

swift-tor runs the Tor daemon in-process via libtor. This has important implications:

  • Anonymity depends on the consuming application. Process-level hygiene (memory, logging, filesystem, network sandbox) is the host app's responsibility.
  • Never log sensitive material. Onion-service private keys, control-port passwords, and bootstrap state must stay out of logs and crash reports.
  • Report anonymity-affecting bugs via GHSA, even if they are not classic CVEs. Traffic analysis leaks, side channels, and fingerprintable behavior qualify.
  • Upstream issues first. Vulnerabilities in the Tor daemon itself should be reported directly to the Tor Project; this repository will rebase on upstream fixes.

Upstream Dependencies

This package wraps Tor and links against OpenSSL (via swift-openssl) and libevent (via swift-event).

Vulnerabilities in the underlying libraries should be reported directly to their respective projects:

There aren't any published security advisories