Qlynk Node Master is currently on an active hiatus. Only the latest stable Enterprise release is monitored for critical security vulnerabilities.
| Version | Supported | Notes |
|---|---|---|
| V09.04.2026-stable (Enterprise) | ✅ | Latest Stable Release. |
| < V1.4.1 | ❌ | Deprecated. Please upgrade to the latest version. |
This repository is engineered with military-grade security protocols. Before submitting a vulnerability report regarding bypasses or scrapers, please note that the system actively employs:
- Honeypot (Tarpit) Routing: Invalid or unauthorized link guesses are intentionally met with a
200 OKstatus and infinite garbage bytes to exhaust bot resources. This is intended behavior, not a vulnerability. - Moving Target Defense: 32-character file slugs rotate dynamically every 6-24 hours. Broken links due to rotation are a security feature, not a bug.
- WAF & IP Rate-Limiting: Brute-force attempts will result in exponential shadow-bans (Fail2Ban logic).
- Tokenized Vault: Direct media downloads are blocked via rolling-expiry tokens and anti-IDM headers.
If you have discovered a legitimate security vulnerability that bypasses the active defenses mentioned above, please report it privately. Do not open a public issue.
How to report:
- Send an email to: [team.deepdey@gmail.com]
- Include
[QLYNK SECURITY]in the subject line. - Provide a detailed description of the vulnerability, the steps to reproduce it, and any potential impact.
The following are completely out of scope for this project and should not be reported:
- Vulnerabilities present in the underlying Hugging Face Spaces infrastructure (Report these to Hugging Face).
- Vulnerabilities present in the Telegram MTProto API.
- Social engineering or phishing attacks targeting the Space Password.
- Denial of Service (DoS) attacks that rely on overwhelming the Hugging Face free-tier limits.