Dynamic Devices takes security seriously. If you discover a security vulnerability in the meta-dynamicdevices-distro layer, please report it responsibly.
Please DO NOT create public GitHub issues for security vulnerabilities.
Instead, please report security issues via one of the following methods:
- Security Email: [email protected]
- Subject:
[SECURITY] meta-dynamicdevices-distro: Brief description
- General Contact: [email protected]
- Technical Lead: [email protected]
When reporting a security vulnerability, please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Affected versions or commits
- Suggested fix (if available)
- Your contact information for follow-up
- Acknowledgment: Within 48 hours of receipt
- Initial Assessment: Within 5 business days
- Status Updates: Weekly until resolution
- Fix Timeline: Varies by severity (Critical: 7 days, High: 14 days, Medium: 30 days)
- Regulatory Reporting: EU CRA incidents reported to authorities within 24 hours
Note: For operational incident response procedures, see docs/security/INCIDENT_RESPONSE_POLICY.md
- Critical: Remote code execution, privilege escalation
- High: Local privilege escalation, information disclosure
- Medium: Denial of service, minor information leaks
- Low: Configuration issues, non-exploitable bugs
This distro layer implements security-focused configurations:
- Disabled zeroconf: Removes Avahi to reduce attack surface
- Commercial license support: For security-critical proprietary components
- Auto-registration: Secure device onboarding with authentication
- Improv protocol: Secure BLE/Serial device provisioning
- Signing support: Code signing and verification capabilities
- Security hardening: Compiler flags and system hardening options
Security updates are provided for:
- lmp-dynamicdevices: Base secure distribution
- lmp-dynamicdevices-base: Minimal secure configuration
- lmp-dynamicdevices-flutter: Flutter with security features
- lmp-dynamicdevices-waydroid: Android container with isolation
The distribution layer provides:
- DISTRO_FEATURES security settings: Controlled feature enablement
- Package selection policies: Security-focused package choices
- Service configuration: Secure service defaults
- Image composition: Security-hardened image recipes
We follow responsible disclosure practices:
- Private Reporting: Initial report kept confidential
- Investigation: Security team investigates and develops fix
- Patch Development: Fix created and tested
- Coordinated Release: Public disclosure after fix is available
- CVE Assignment: Request CVE if applicable
- Yocto Project Security: https://wiki.yoctoproject.org/wiki/Security
- Foundries.io LMP Security: https://docs.foundries.io/latest/reference-manual/security/
- Linux Security: https://www.kernel.org/category/security.html
Dynamic Devices Ltd
- Website: https://dynamicdevices.co.uk
- Security Email: [email protected]
- Business Hours: Monday-Friday, 9:00-17:00 GMT
This security policy is effective as of October 2025 and is updated to comply with EU Cyber Resilience Act (CRA) requirements. For comprehensive incident response procedures, refer to the operational incident response policy.