We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
- Do NOT create public GitHub issues for security vulnerabilities
- Email: Report vulnerabilities privately via GitHub Security Advisories
- Go to the Security tab and create a new advisory
- Include: A clear description of the vulnerability, steps to reproduce, and potential impact
- We will acknowledge receipt within 48 hours
- We aim to provide an initial assessment within 7 days
- We will keep you informed of our progress
- We will credit you in the security advisory (if desired)
| Version | Supported |
|---|---|
| main | ✅ |
This project implements several security controls:
- CI Security Scans: Dependency Review, Trivy (filesystem + IaC), Bandit (Python), Hadolint (Dockerfiles), Shellcheck, YAML Lint
- OpenSSF Scorecard: Automated security health metrics
- Dependency Updates: Dependabot for GitHub Actions dependencies
- Pre-commit Hooks: Trailing whitespace, go fmt/vet, Helm lint
- PR Verification: Conventional commit enforcement via pr-verifier
For deployment security configuration, see:
- AuthBridge README - Authentication bridge architecture
- kagenti-webhook README - Admission webhook configuration