| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of AutoMender seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
- Email: Send details to the repository owner via GitHub
- Include:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days for critical issues
AutoMender implements the following security measures:
- JWT-based authentication for API endpoints (planned)
- Role-based access control for administrative functions (planned)
- All sensitive configuration stored in environment variables
- No credentials stored in source code
- API keys validated before use
- CORS configured for specific trusted origins only
- HTTPS recommended for production deployment
- Input validation on all API endpoints
- Sandboxed code execution environment
- Limited file system access
- Audit logging of all AI-generated fixes
- Environment Variables: Never commit API keys or secrets
- HTTPS: Always use TLS in production
- Firewall: Restrict access to RabbitMQ management interface
- Updates: Keep all dependencies up to date
- Monitoring: Enable audit logging for all operations
We appreciate responsible disclosure from security researchers.