Skip to content

Security: grove/pg-trickle

Security

SECURITY.md

Security Policy

Supported Versions

Version Supported
0.1.x (current pre-release)

Once v1.0.0 is released, the two most recent minor versions will receive security fixes.

Reporting a Vulnerability

Please do not report security vulnerabilities via public GitHub Issues.

Use GitHub's built-in private vulnerability reporting:

  1. Go to the Security tab of this repository
  2. Click "Report a vulnerability"
  3. Fill in the details — affected version, description, reproduction steps, and potential impact

We aim to acknowledge reports within 48 hours and provide a fix or mitigation within 14 days for critical issues.

What to Include

A useful report includes:

  • PostgreSQL version and pg_trickle version
  • Minimal reproduction SQL or Rust code
  • Description of the unintended behaviour and its security impact
  • Whether the vulnerability requires a trusted (superuser) or untrusted role to trigger

Scope

In-scope:

  • SQL injection or privilege escalation via pgtrickle.* functions
  • Memory safety issues in the Rust extension code (buffer overflows, use-after-free, etc.)
  • Denial-of-service caused by a low-privilege user triggering runaway resource usage
  • Information disclosure through change buffers (pgtrickle_changes.*) or monitoring views

Out-of-scope:

Disclosure Policy

We follow coordinated disclosure. Once a fix is released we will publish a security advisory on GitHub with a CVE if applicable.

There aren’t any published security advisories