Version | Supported |
---|---|
> 1.0 | ✅ |
Contact security@grlx.dev with any relevant info including:
- criticality
- a summary
- any reproduction information
- whether or not you desire attribution
- patches (if you have them)
Turnaround time should be within a matter of hours, at most 72 for confirmation.
If your vulnerability is accepted, we will release a new hotfix and notify users. We will explain the vulnerability to the community after a reasonable amount of time has elapsed, allowing users the chance to update, and you will be credited at this time, if you desire.
All grlx releases are cryptographically signed with GPG to ensure authenticity and integrity.
- Key ID:
33DCE4DD
- Fingerprint:
3F62 7C68 8B72 ACC6 BC4C A9A7 1E0B 7A1D 33DC E4DD
- Owner: grlx signing key security@grlx.dev
# Method 1: From key servers
gpg --keyserver keyserver.ubuntu.com --recv-keys 33DCE4DD
# Method 2: From this repository
curl -s https://raw.githubusercontent.com/gogrlx/grlx/master/gpg-public-key.asc | gpg --import
# Method 3: Manual import
gpg --import gpg-public-key.asc
# Download the files
curl -LO https://github.com/gogrlx/grlx/releases/download/v1.0.0/checksums.txt
curl -LO https://github.com/gogrlx/grlx/releases/download/v1.0.0/checksums.txt.sig
# Verify signature
gpg --verify checksums.txt.sig checksums.txt
# Verify binary checksum
sha256sum -c checksums.txt --ignore-missing
# Download from S3
curl -LO https://artifacts.grlx.dev/linux/amd64/latest/grlx
curl -LO https://artifacts.grlx.dev/linux/amd64/latest/checksums.txt
curl -LO https://artifacts.grlx.dev/linux/amd64/latest/checksums.txt.sig
# Verify signature and checksum
gpg --verify checksums.txt.sig checksums.txt
sha256sum -c checksums.txt --ignore-missing
After importing the key, verify the fingerprint matches:
gpg --fingerprint 33DCE4DD
Expected output:
pub ed25519 2025-06-08 [SC]
3F62 7C68 8B72 ACC6 BC4C A9A7 1E0B 7A1D 33DC E4DD
uid grlx signing key <security@grlx.dev>
sub cv25519 2025-06-08 [E]