The Arco maintainers take security seriously. We appreciate your efforts to responsibly disclose your findings.
| Version | Supported |
|---|---|
| 0.x.x | ✅ |
Once we reach 1.0, we will maintain security updates for the current major version and one prior major version.
Please do not report security vulnerabilities through public GitHub issues.
Send a detailed report to: security@daxis.io
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours of your report
- Initial Assessment: Within 5 business days
- Status Updates: Every 7 days until resolution
- Resolution: Target within 90 days for critical issues
- We will coordinate disclosure timing with you
- You will be credited in the security advisory (unless you prefer anonymity)
- We may offer a bounty for significant findings (at our discretion)
- Dependency policy enforced via
cargo-deny(licenses/sources/bans) - License allowlist enforced via
cargo-deny(with explicit exceptions) - Automated vulnerability scanning via
cargo-deny advisoriesand scheduledpip-audit - SBOM generation for releases via
cargo sbom(SPDX + CycloneDX)
- No
unsafecode without explicit review and documentation - Memory safety enforced through Rust's ownership model
- All cryptographic operations use audited libraries
- Input validation at all public API boundaries
- Multi-tenant isolation enforced at storage and service layers
- No credentials in code or configuration files
- Secrets managed through environment variables or secret managers
- Audit logging for security-relevant operations
- Run with minimal required permissions
- Enable TLS for all network communications
- Use dedicated service accounts
- Implement network segmentation
- Enable audit logging
- Never commit credentials to version control
- Use environment variables or secret managers
- Rotate credentials regularly
- Review access permissions periodically
- Monitor for unusual access patterns
- Set up alerts for failed authentication attempts
- Review audit logs regularly
- Keep dependencies updated
We follow a coordinated disclosure approach:
- Private Report: Vulnerability reported privately
- Verification: We verify and assess the issue
- Fix Development: We develop and test a fix
- Release: Fix released with security advisory
- Public Disclosure: Details published after users have time to update
We request a 90-day disclosure window for critical vulnerabilities to allow users adequate time to patch.
Security advisories are published via:
- GitHub Security Advisories
- Release notes
- Direct notification to known enterprise users
- Security Issues: security@daxis.io
- General Questions: See CONTRIBUTING.md
Thank you for helping keep Arco and its users safe!