Currently, Ferrum is in early development (v0.1.0). Security updates will be provided for the latest version only.
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in Ferrum, please report it responsibly:
- Security vulnerabilities in the client code
- Potential exploits in the networking layer
- Asset loading vulnerabilities
- Subprocess management security issues
- Any other security concerns
- Do NOT open a public GitHub issue for security vulnerabilities
- Use GitHub Security Advisories to report privately
- Provide detailed information about the vulnerability:
- Description of the issue
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment of your report within 48 hours
- Regular updates on the progress of fixing the vulnerability
- Credit for responsible disclosure (if desired)
Ferrum loads Minecraft assets from multiple sources. Users should:
- Only use assets from trusted sources (official Mojang servers, legitimate Minecraft installations)
- Be cautious when using third-party asset mirrors
- Verify asset integrity when possible
Ferrum spawns Pumpkin-MC as a subprocess. Security considerations:
- Pumpkin binary should be from a trusted source
- Process isolation is enforced via process groups
- Subprocess communication is limited to stdin/stdout
- Ferrum connects to localhost by default (Pumpkin subprocess)
- No remote server connections in current version
- Future versions will implement proper authentication
- No sandboxing of Pumpkin subprocess (runs with same privileges as client)
- No asset signature verification
- No encrypted communication (localhost only currently)
- Asset signature verification
- Subprocess sandboxing
- Encrypted network communication
- Authentication system for remote servers