If you believe you have found a security vulnerability in MRTKLIB, please do not open a public GitHub issue.
Report it privately using GitHub's Private Vulnerability Reporting:
- Go to https://github.com/h-shiono/MRTKLIB/security/advisories/new
- Describe the issue, including:
- Affected component(s) (e.g.
mrtk run, RTCM3 decoder, TOML parser) - Affected version or commit hash
- Steps to reproduce, ideally with a minimal dataset or command line
- The impact you observed or can demonstrate
- Affected component(s) (e.g.
- Submit the advisory. You (the reporter), the maintainers, and any invited collaborators will be able to see it, and it remains private from the public until disclosure.
You will receive an acknowledgement within a reasonable time frame. Because MRTKLIB is maintained by a small team, please be patient if the first response takes a few days.
- Crashes, memory-safety issues (out-of-bounds reads/writes, use-after-free), or undefined behavior triggered by crafted inputs: RTCM3 streams, BINEX messages, UBX frames, SBF blocks, L6D/L6E correction payloads, RINEX files, TOML configuration files
- Path traversal or arbitrary-file-write issues in file-handling paths
- Network-protocol weaknesses in the stream layer (NTRIP client/server, TCP/UDP handlers) that could be exploited by a malicious peer
- Authentication or credential-handling bugs in the stream layer
- Incorrect positioning results or Fix-rate regressions — please use the "Positioning accuracy / Fix-rate issue" template under https://github.com/h-shiono/MRTKLIB/issues/new/choose
- Bugs that require local root access to exploit
- Denial of service through abnormally large input files, absent a concrete exploitation path
We follow a coordinated-disclosure model. After triage we will work with you on a fix timeline; public disclosure happens once a patch is available or after a mutually agreed deadline. You will be credited in the advisory unless you prefer to remain anonymous.
Private reports of Code of Conduct violations are routed through the same GitHub Security Advisory channel described above. When filing, please state in the advisory title or summary that the report concerns conduct rather than a technical vulnerability, so it is triaged on the conduct path instead of the security path.
Using the advisory channel for conduct reports is a pragmatic choice for a small project: it reuses an existing private, auditable intake without introducing a separate email address or form. We may introduce a dedicated conduct-report channel in the future if volume or scope warrants it.