We actively support security updates for the following versions:
Version | Supported |
---|---|
2.x.x | ✅ Yes |
1.x.x | ✅ Yes |
< 1.0 | ❌ No |
If you discover a security vulnerability, please report it responsibly:
🚨 DO NOT open a public issue for security vulnerabilities.
Instead, please email us at:
- 📧 security@doom-assistant.com
- 🔐 Use PGP key:
[PGP_KEY_ID]
for sensitive communications
When reporting a security issue, please provide:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if any)
- Your contact information
- 24 hours: Initial acknowledgment
- 7 days: Detailed response with assessment
- 30 days: Security patch release (if applicable)
- Static Analysis: Automated code scanning
- Dependency Scanning: Regular vulnerability checks
- Code Reviews: All changes require review
- Secure Coding: Following OWASP guidelines
- Signed Releases: All releases digitally signed
- Reproducible Builds: Verifiable build process
- Supply Chain: Trusted build environment
- Checksums: SHA-256 hashes for all releases
- Input Validation: All user inputs sanitized
- File System: Restricted file access permissions
- Process Isolation: Minimal system privileges
- Error Handling: No sensitive data in error messages
This tool is designed to work with legally owned copies of DOOM Eternal only:
- ✅ Backup purposes: For legitimate game owners
- ✅ Accessibility: Offline play for purchased games
- ❌ Piracy: We do not support or condone piracy
- ❌ Distribution: Do not distribute copyrighted game files
Users must:
- Own a legitimate copy of DOOM Eternal
- Comply with local copyright laws
- Respect Bethesda's Terms of Service
- Use the tool at their own risk
- This tool is provided "as is" without warranty
- Users assume all risks from usage
- Not affiliated with id Software or Bethesda
- Educational and research purposes only
- ❌ Personal information
- ❌ Game files or content
- ❌ Usage analytics
- ❌ System information
- ❌ Network activity
- ✅ Hardware configuration (for optimization)
- ✅ Game installation paths (for setup)
- ✅ User preferences (stored locally)
- ✅ Error logs (stored locally only)
- GitHub: For software distribution only
- No telemetry: No data sent to external servers
- No tracking: No user behavior monitoring
-
Download only from official sources:
- GitHub releases page
- Official website
- Verified mirrors only
-
Verify integrity:
# Check SHA-256 hash certutil -hashfile setup.exe SHA256
-
Run as administrator (when required):
- Only for initial setup
- Never for regular use
-
Antivirus compatibility:
- May trigger false positives
- Add to exclusions if needed
- Scan downloaded files first
-
Firewall settings:
- Tool works completely offline
- No network access required
- Block if desired for extra security
-
System permissions:
- Grant minimal required permissions
- Review requested access carefully
- Revoke unnecessary permissions
- Code Signing: All executables digitally signed
- Checksum Verification: File integrity validation
- Sandboxed Operation: Limited system access
- Error Isolation: Graceful failure handling
- Integrity Checks: Detect file modifications
- Signature Validation: Verify authentic files
- Secure Updates: Cryptographically signed updates
- Rollback Protection: Prevent version downgrade attacks
- Last audit: [Date]
- Auditor: [Company/Individual]
- Scope: Full codebase review
- Results: Available upon request
- Code reviews: Required for all changes
- Security testing: Automated and manual
- Vulnerability scanning: Weekly automated scans
- Penetration testing: Quarterly assessments
- 📧 Primary: security@doom-assistant.com
- 📧 Backup: security-backup@doom-assistant.com
- 💬 Discord: @SecurityTeam (private channel)
- 📧 Legal: legal@doom-assistant.com
- 📧 DMCA: dmca@doom-assistant.com
- 📧 Copyright: copyright@doom-assistant.com
We recognize security researchers who help improve our security:
- [Researcher Name] - Vulnerability in configuration parser
- [Researcher Name] - Input validation improvement
- [Your Name Here] - Be the next to help us!
- Critical vulnerabilities: Public recognition + special badge
- High severity: Public recognition
- Medium/Low severity: Acknowledgment in release notes
- Input validation for all user inputs
- Error handling without information disclosure
- Secure file operations with proper permissions
- No hardcoded credentials or secrets
- Following secure coding guidelines
- Security considerations documented
- User security guidance provided
- Installation security best practices
- Threat model considerations
- Dependency updates: Monthly security patches
- Code reviews: All changes reviewed for security
- Automated scanning: Continuous vulnerability detection
- User notifications: Security updates clearly marked
- Immediate assessment: Critical issues evaluated within hours
- Rapid patching: Emergency releases within 24-48 hours
- User notification: Multiple channels for critical updates
- Post-incident review: Learn and improve processes
- 🔒 Secure by design: Built with security first
- 🌐 Offline operation: No network requirements
- ⚖️ Legal compliance: Educational use only
- 🔐 Privacy focused: No data collection
- 📧 Responsible disclosure: security@doom-assistant.com
Last updated: [Current Date] Security policy version: 2.1