If you discover a security vulnerability in nvcontrol, please report it responsibly:
- Do not open a public GitHub issue for security vulnerabilities
- Email security concerns to the maintainers (see CONTRIBUTING.md for contact)
- Include detailed steps to reproduce the issue
- Allow reasonable time for a fix before public disclosure
| Version | Supported |
|---|---|
| 0.8.x | Yes |
| < 0.8 | No |
nvcontrol interacts with NVIDIA kernel drivers and requires elevated privileges for certain operations:
| Operation | Privilege | Reason |
|---|---|---|
| Read GPU info | User | NVML read-only access |
| Fan control | Root | Direct NVKMS ioctl |
| Power limits | Root | NVML privileged API |
| Overclock/Undervolt | Root | Direct NVKMS ioctl |
| Profile switching | User | Config file only |
- NVML API: Read-only queries via
nvml-wrappercrate - NVKMS ioctl: Direct
/dev/nvidia*device access for fan/clock control - No kernel modules: Does not load or modify kernel modules
| Location | Contents | Permissions |
|---|---|---|
~/.config/nvcontrol/ |
User profiles, settings | User-only (0600) |
~/.local/state/nvcontrol/ |
Support bundles, runtime state, diagnostics output | User-only |
nvcontrol makes no network connections. All operations are local.
We use cargo audit to check for known vulnerabilities in dependencies.
# Install cargo-audit
cargo install cargo-audit
# Run audit
cargo auditAudit performed: 2026-04-22 Tool version: cargo-audit 0.21.x Result: 0 known vulnerabilities on Linux, with the GTK3 tray surface removed and the advisory set reduced accordingly
The following advisory warnings are accepted for v0.8.7. They are transitive dependencies with low practical risk:
| Advisory | Crate | Severity | Source | Disposition |
|---|---|---|---|---|
| RUSTSEC-2026-0009 | time |
Medium (DoS) | mac-notification-sys |
macOS-only, not compiled on Linux |
| RUSTSEC-2026-0002 | lru |
Warning (unsound) | ratatui |
IterMut not in code path |
| RUSTSEC-2025-0119 | number_prefix |
Warning (unmaintained) | indicatif |
Progress bars only |
- time DoS: Only affects macOS via
mac-notification-sys. nvcontrol is Linux-only. - lru unsoundness: The affected iterator API is not used in nvcontrol paths.
- number_prefix: Used only for progress display.
These warnings will be addressed when:
ratatuiupdateslrudependencyindicatifreplacesnumber_prefix
For users running nvcontrol:
- Run GUI/TUI as unprivileged user when possible (read-only monitoring)
- Use
sudo nvctlonly for operations requiring root (fan control, power limits) - Review profiles before importing from untrusted sources
- Keep NVIDIA drivers updated (535+ required)
- Review support bundles before sharing if using
nvctl doctor --supportornvctl driver support-bundle
Security-related changes are documented in CHANGELOG.md under the "Security" section for each release.