We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| latest | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability, please report it by:
- DO NOT open a public issue
- Email the maintainers or use GitHub's private vulnerability reporting
- Include detailed information about the vulnerability:
- Type of vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and provide regular updates on the fix progress.
Our CI/CD pipeline implements multiple security layers:
- Fork PR Protection: Pull requests from forks require manual approval (via
safe-to-buildlabel) before builds run - SBOM Generation: Software Bill of Materials is generated for all builds
- Provenance Attestation: Build provenance is recorded for supply chain security
- Limited Permissions: Workflows use minimal required permissions
- No Push from PRs: Pull requests only build images locally, never push to registry
- Verified amd64 image builds
- Regular base image updates
- Minimal attack surface
- Non-root user execution where possible
- Automated dependency updates via Dependabot
- Security alerts enabled
- Regular security audits
When contributing:
- Never commit secrets, tokens, or credentials
- Use environment variables for sensitive configuration
- Keep dependencies up to date
- Follow principle of least privilege
- Validate and sanitize all user inputs
- Use parameterized queries for database operations
Our repository includes:
- Dependabot for dependency updates
- GitHub Security Advisories monitoring
For maintainers reviewing fork PRs:
- Review the PR code thoroughly for malicious content
- Check for suspicious file modifications
- Verify no secrets or credentials are exposed
- Only add
safe-to-buildlabel if code is verified safe - Remove label immediately if concerns arise
Security updates are prioritized and released as soon as possible. Subscribe to repository releases to stay informed.