| Version | Supported |
|---|---|
| latest-release | ✅ |
| * | ❌ |
Rizin is a user-space Command Line Interface (CLI) tool that isn't considered a high-availability service. As such, issues that impact Rizin's availability will not be considered as vulnerabilities by the security team. Such issues include, but are not limited to:
- NULL Pointer Dereference
- Memory Exhaustion
Issues that can leak non-sensitive memory contents (e.g memory addresses and values, etc.) should be demonstrated to be usable by an attacker and will be considered on a case-by-case basis.
Security issues in the Rizin repository should be reported by email to [email protected]. Your email will be delivered to a small security team that will handle the report. Your email will be acknowledged within 48 hours, and you'll receive a more detailed response to your email within 72 hours indicating the next steps in handling your report.
For your convenience, we accept reports written in one of the languages listed on our security.txt page, but we prefer reports in English. Please try to always include in your report an attack scenario, showing how the issue can affect Rizin users.
If you have not received a reply to your email within 48 hours, or have not heard from the security team for the past week, there are a few steps you can take (in order):
- Directly contact at least one member from Rizin Security Team
- Inform the team over the public chats that you sent a message regarding a security issue.
Important: Don't disclose any information regarding the issue itself in the public chats.
Following the widespread availability of large language models and generative AI, we have seen a number of security reports generated partially or entirely using such tools. Many of these contain inaccurate, misleading, or fictitious content. While AI tools can help draft or analyze reports, they must not replace human understanding and review.
If you use AI tools to help prepare a report, you must:
- Disclose which AI tools were used and specify what they were used for (analysis, writing the description, writing the exploit, etc).
- Verify that the issue describes a real, reproducible vulnerability that otherwise meets these reporting guidelines.
- Avoid fabricated code, placeholder text, or references to non-existent code.
Reports that appear to be unverified AI output will be closed without response. Repeated low-quality submissions may result in a ban.
For these reasons, we decided to align with similar policies adopted by other major open-source projects, which have described the flood of unverified AI-generated reports as disruptive, counterproductive, and a drain on limited security team resources.