Currently, the following versions of MacFIRE are supported with security updates:
| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| 1.2.x | ✅ |
| 1.1.x | ❌ |
| 1.0.x | ❌ |
macFIRE is a forensic acquisition tool designed to handle potentially sensitive data. Please consider the following security aspects when using this tool:
-
Root/Administrative Access: The tool requires root privileges to collect many artifacts. Always run it with the minimum necessary privileges for your specific task.
-
Data Sensitivity: Data collected by macFIRE may contain sensitive information. Ensure proper handling of all collected artifacts according to your organization's data protection policies.
-
Chain of Custody: When using macFIRE for formal investigations, maintain appropriate chain of custody procedures beyond what the tool automatically documents.
-
Local Operation: All processing occurs locally on the machine running macFIRE. No data is transmitted to external servers.
-
Output Security: Secure all output directories containing forensic artifacts and reports, as they may contain sensitive system and user information.
We take the security of macFIRE seriously. If you believe you've found a security vulnerability, please follow these steps:
-
Do Not Disclose Publicly: Please do not disclose the vulnerability publicly until it has been addressed.
-
Create a Security Advisory: Report the vulnerability through GitHub's Security Advisory feature or directly to the maintainers at riyan.pratama@security-life.org.
-
Include Details: Provide as much information as possible, including:
- A clear description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fixes (if any)
-
Response Time: We aim to acknowledge receipt of vulnerability reports within 48 hours and will provide an estimated timeline for a fix based on severity.
-
Recognition: We're happy to acknowledge your contribution in our release notes if desired.
-
Verify Downloads: Always verify the integrity of macFIRE downloads by checking the provided SHA-256 hashes.
-
Keep Updated: Use the latest version of macFIRE to benefit from security patches and improvements.
-
Isolated Environment: When possible, run macFIRE on isolated networks, especially when processing potentially compromised systems.
-
Review Output: Always review the generated reports and logs for sensitive information before sharing them.
-
Secure Storage: Store disk images and artifact collections securely, preferably encrypted when at rest.
-
User Access Control: Limit access to macFIRE outputs to authorized personnel only.
macFIRE relies primarily on Python standard libraries and native macOS commands, minimizing external dependencies. However:
-
We regularly review and update any dependencies that may be added in the future.
-
We use GitHub's Dependabot to monitor for security issues in dependencies.
-
We recommend using virtual environments when running macFIRE to isolate dependencies.
The macFIRE development team follows these security practices:
- Code reviews for all changes
- Regular security audits of the codebase
- Testing in various environments before release
- Verification of all external commands executed by the tool
- Proper error handling to prevent information leakage
When security vulnerabilities are fixed, we will provide credit to the reporter (if desired) in the release notes and/or commit messages.
This security policy may be updated from time to time. When significant changes are made, we will update the version number and date below.
Version: 1.0
Last Updated: April 1, 2025