Skip to content

Security: SyedShaheerHussain/Ransomware-Simulation-and-Defense-Mechanism-Python-GUI

SECURITY.md

πŸ›‘οΈ Security Policy

πŸ“Œ Project Overview

CyberLab: Ransomware Simulation & Defense Mechanism is an educational cybersecurity sandbox designed to simulate ransomware attacks and defense strategies in a controlled, non-malicious environment.

This project does not contain real malware. All encryption and attack simulations are confined to a local sandbox directory.

🚨 Reporting a Vulnerability

If you discover a security vulnerability in this project, please report it responsibly.

πŸ“¬ How to Report

Please send an email with the following details:

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Suggested remediation (if known)
  • Screenshots or logs (if applicable)

πŸ”’ Subject Line: CyberLab Security Disclosure

Please do NOT create a public GitHub issue for security vulnerabilities.

⏳ Response Timeline

Stage Timeline
Initial acknowledgment Within 72 hours
Triage & assessment Within 7 days
Fix development Depends on severity
Public disclosure After patch release

We follow responsible disclosure practices and appreciate ethical reporting.

πŸ” Supported Versions

Currently supported versions for security updates:

Version Supported
Latest main branch βœ… Yes
Older versions ❌ No

Users are strongly encouraged to use the latest version of the project.

⚠️ Security Scope & Limitations

What This Project Is:

  • A controlled ransomware simulation
  • An educational research tool
  • A local sandbox-only encryption engine

What This Project Is NOT:

  • Real ransomware
  • A penetration testing framework for unauthorized systems
  • A production-ready enterprise security solution

πŸ§ͺ Safe Usage Guidelines

To prevent accidental misuse:

  1. Always ensure the encryption path points to the internal /sandbox directory.
  2. Never use generated encryption keys on personal or sensitive data.
  3. Do not modify the encryption engine to operate outside the sandbox.
  4. Run the application inside a virtual environment.

πŸ›‘ Prohibited Use

The following actions are strictly prohibited:

  • Using the code or techniques against systems without explicit permission.
  • Modifying the project into real malware.
  • Deploying any part of this project in production systems as a real defense product.
  • Using the encryption engine outside the sandbox environment.

Misuse may violate local and international cybersecurity laws.

🧰 Secure Development Practices

This project follows these principles:

  • Least privilege (RBAC roles: Admin vs Operator)
  • MFA for sensitive operations (TOTP)
  • Immutable backup snapshots
  • Behavioral anomaly detection
  • Local-only file operations
  • No network exfiltration capabilities

πŸ“¦ Dependencies

This project relies on third-party libraries such as:

  • cryptography
  • PySide6
  • scikit-learn
  • pyotp
  • watchdog
  • matplotlib

Please ensure dependencies are kept up to date to mitigate known vulnerabilities.

You can check for outdated packages using:

pip list --outdated

πŸ” Security Design Principles

CyberLab follows a Defense-in-Depth model:

  1. Detection (Behavior Monitoring + AI Anomaly Engine)
  2. Prevention (MFA, RBAC)
  3. Recovery (Immutable Backups)
  4. Visibility (Audit Logs & Telemetry)

πŸ› Legal Disclaimer

This project is intended strictly for:

  • Educational use
  • Academic research
  • Cybersecurity awareness training

The author is not responsible for misuse, illegal activities, or damages caused by modifying or deploying this project outside its intended scope.

πŸ™Œ Acknowledgment

We appreciate responsible security researchers and ethical hackers who help improve this project.

Created for the next generation of defenders. Β© 2026 Syed Shaheer Hussain

There aren’t any published security advisories