| Version | Supported |
|---|---|
| 0.2.x | ✅ |
If you discover a security vulnerability within Argus, please send an email to fev.dev@proton.me.
- A clear description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (optional but appreciated)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days (depending on severity)
- Acknowledgment: We will acknowledge receipt of your report
- Assessment: We will assess the vulnerability and its impact
- Communication: We will keep you informed of our progress
- Credit: If desired, we will credit you in the release notes
When using Argus:
- Only scan networks you own or have explicit written permission to test
- Keep your Argus installation updated
- Use environment variables for sensitive configuration (API keys)
- Review scan results before sharing (may contain sensitive data)
- Follow responsible disclosure practices
- Scan networks without authorization
- Store credentials in version-controlled files
- Share scan reports publicly without sanitizing sensitive data
- Use Argus for malicious purposes
Argus is designed for authorized security testing only. Unauthorized use of this tool may violate local, state, national, and international laws. Users are solely responsible for ensuring they have proper authorization before conducting any security assessments.
The author is not responsible for any misuse or damage caused by this tool.
Contact: fev.dev@proton.me