|
| 1 | +# Security Policy |
| 2 | + |
| 3 | +## Reporting a Vulnerability |
| 4 | + |
| 5 | +At GPU Monitor, we take security seriously. If you believe you've found a security vulnerability, please follow these steps: |
| 6 | + |
| 7 | +1. **Do Not** disclose the vulnerability publicly until it has been addressed. |
| 8 | +2. Send a detailed report to the repository owner via GitHub's private vulnerability reporting. |
| 9 | +3. Include as much information as possible: |
| 10 | + - Description of the vulnerability |
| 11 | + - Steps to reproduce |
| 12 | + - Potential impact |
| 13 | + - Suggested fixes (if any) |
| 14 | + |
| 15 | +## Response Timeline |
| 16 | + |
| 17 | +- Initial Response: Within 48 hours |
| 18 | +- Status Update: Within 7 days |
| 19 | +- Fix Implementation: Timeline will be communicated based on severity |
| 20 | + |
| 21 | +## Scope |
| 22 | + |
| 23 | +### In Scope |
| 24 | +- Main GPU Monitor container application |
| 25 | +- Dashboard web interface |
| 26 | +- Data collection components |
| 27 | +- Configuration files |
| 28 | +- Docker-related security concerns |
| 29 | + |
| 30 | +### Out of Scope |
| 31 | +- Issues in NVIDIA drivers |
| 32 | +- Host system configurations |
| 33 | +- Issues already reported |
| 34 | +- Third-party CDN services |
| 35 | + |
| 36 | +## Security Considerations |
| 37 | + |
| 38 | +### Container Security |
| 39 | +- Container runs with necessary GPU permissions only |
| 40 | +- Uses official base images |
| 41 | +- Regular base image updates |
| 42 | +- No unnecessary ports exposed |
| 43 | + |
| 44 | +### Data Security |
| 45 | +- No sensitive data collection |
| 46 | +- Local storage only |
| 47 | +- No external data transmission |
| 48 | +- Volume permissions properly configured |
| 49 | + |
| 50 | +### Web Interface |
| 51 | +- Basic browser security headers |
| 52 | +- No authentication required (designed for local network use) |
| 53 | +- Static file serving only |
| 54 | +- No user data collection |
| 55 | + |
| 56 | +### Best Practices |
| 57 | +1. Always use latest version |
| 58 | +2. Run behind firewall if exposed |
| 59 | +3. Monitor container logs |
| 60 | +4. Keep Docker and NVIDIA drivers updated |
| 61 | +5. Use proper volume permissions |
| 62 | + |
| 63 | +## Version Support |
| 64 | + |
| 65 | +We actively maintain and provide security updates for: |
| 66 | +- Latest major version |
| 67 | +- Previous major version (critical fixes only) |
| 68 | + |
| 69 | +## Security Features |
| 70 | + |
| 71 | +- SBOM (Software Bill of Materials) provided |
| 72 | +- Docker image signing |
| 73 | +- Automated vulnerability scanning in CI/CD |
| 74 | +- Regular dependency updates |
| 75 | + |
| 76 | +## Dependency Management |
| 77 | + |
| 78 | +We regularly monitor and update: |
| 79 | +- Base container images |
| 80 | +- JavaScript dependencies |
| 81 | +- Python packages |
| 82 | +- System packages |
| 83 | + |
| 84 | +## Disclaimer |
| 85 | + |
| 86 | +This project is provided "as is" without warranty. While we strive to address security concerns promptly, we recommend: |
| 87 | +- Running in trusted networks only |
| 88 | +- Regular security audits |
| 89 | +- Following Docker security best practices |
| 90 | +- Monitoring container health and logs |
| 91 | + |
| 92 | +## Updates |
| 93 | + |
| 94 | +This security policy may be updated from time to time. Please check back regularly for any changes. |
| 95 | + |
| 96 | +Last Updated: November 2024 |
0 commit comments