Author: Adrian Johnson adrian207@gmail.com
Audit-Azure is a security auditing platform, and we take the security of the project itself very seriously. We appreciate the security research community's efforts to responsibly disclose vulnerabilities.
We actively support the following versions with security updates:
| Version | Supported | Support Status |
|---|---|---|
| 1.0.x | β Yes | Active support |
| 0.1.x | β No | Development only, not for production |
| < 0.1 | β No | Pre-release, unsupported |
- β Open a public GitHub issue for security vulnerabilities
- β Discuss the vulnerability in public forums or social media
- β Exploit the vulnerability beyond what is necessary to demonstrate it
- β
Email security reports to adrian207@gmail.com with subject line:
[SECURITY] Audit-Azure Vulnerability Report - β Provide detailed information to help us understand and reproduce the issue
- β Allow reasonable time for us to fix the vulnerability before public disclosure
- β Work with us on coordinated disclosure
When reporting a security vulnerability, please include:
**Summary**: Brief description of the vulnerability
**Severity**: [Critical/High/Medium/Low]
**Affected Version(s)**: [e.g., 1.0.0, all versions, etc.]
**Vulnerability Type**: [e.g., SQL Injection, XSS, Authentication Bypass, etc.]
**Description**: Detailed description of the vulnerability
**Steps to Reproduce**:
1. Step 1
2. Step 2
3. ...
**Proof of Concept**:
[Code snippet, screenshots, or video demonstrating the vulnerability]
**Impact**:
What can an attacker do with this vulnerability?
**Proposed Mitigation**:
If you have suggestions for fixing the issue
**Discoverer**:
Your name/handle (for acknowledgment)
**Contact**:
Your email for follow-up questions[Inference] We aim to respond to security reports according to the following timeline:
| Timeframe | Action |
|---|---|
| 24-48 hours | Initial response acknowledging receipt |
| 3-5 days | Assessment of severity and impact |
| 7-30 days | Develop and test fix (depending on severity) |
| Upon fix | Coordinated disclosure with reporter |
We assess vulnerabilities using the following criteria:
- Remote code execution
- Authentication bypass with full system access
- SQL injection with database compromise
- Response time: Immediate, fix within 7 days
- Privilege escalation
- Sensitive data exposure
- Authentication bypass (limited access)
- Response time: Fix within 14 days
- Cross-site scripting (XSS)
- Information disclosure
- Denial of service (limited impact)
- Response time: Fix within 30 days
- Minor information leakage
- Best practice violations
- Response time: Fix in next minor release
The following components are in scope for security reports:
-
API Backend (
api/)- Authentication and authorization
- Input validation
- SQL injection prevention
- API endpoint security
-
Web UI (
ui/)- XSS vulnerabilities
- CSRF protection
- Client-side security
-
Database Layer (
persistence/)- SQL injection
- Data validation
-
Azure Integration (
azure_sdk/)- Credential handling
- Authentication flows
-
Dependencies
- Known vulnerabilities in third-party packages
The following are typically out of scope:
- β Social engineering attacks
- β Physical access to servers
- β Denial of service (unless easily exploitable)
- β Issues in third-party Azure services
- β Theoretical vulnerabilities without proof of concept
- β Vulnerabilities requiring excessive user interaction
- β Issues in unsupported versions
When deploying Audit-Azure:
- β Use Service Principal authentication in production
- β Store credentials in Azure Key Vault
- β Rotate credentials regularly (90 days recommended)
- β Apply principle of least privilege
- β Don't use Azure CLI authentication in production
- β Don't store credentials in code or config files
- β Deploy behind Azure Application Gateway or similar WAF
- β Use HTTPS/TLS for all connections
- β Implement network segmentation
- β Use Azure Private Link when possible
- β Don't expose API directly to internet in production
- β Use PostgreSQL instead of SQLite in production
- β Enable database encryption at rest
- β Use TLS for database connections
- β Implement database backups
- β Don't use default credentials
- β Enable Azure Monitor logging
- β Set up security alerts
- β Monitor API access logs
- β Review audit logs regularly
When contributing to Audit-Azure:
- β Use parameterized queries (SQLAlchemy ORM does this)
- β Validate all user inputs
- β Sanitize outputs to prevent XSS
- β Use type hints for better code safety
- β Follow OWASP Top 10 guidelines
- β Pin dependency versions
- β Regularly update dependencies
- β Review dependency security advisories
- β
Use
pip auditorsafetyfor Python - β
Use
npm auditfor Node.js
- β Write security-focused unit tests
- β Test authentication and authorization
- β Test input validation
- β Test error handling (don't leak info)
We maintain a record of security vulnerabilities and their fixes:
No security advisories have been published yet for Audit-Azure v1.0.0.
Check CHANGELOG.md for security-related updates in each release.
We recognize and thank security researchers who responsibly disclose vulnerabilities:
No vulnerabilities reported yet
For valid vulnerability reports, we offer:
- π Public acknowledgment (if desired)
- π Recognition in release notes
- π§ Direct communication with maintainers
- π€ Potential collaboration opportunities
Note: [Inference] This is an open-source project maintained by volunteers. We do not offer monetary bug bounties at this time.
- Email: adrian207@gmail.com
- Subject:
[SECURITY] Audit-Azure Vulnerability Report - PGP: Coming soon
- Email: adrian207@gmail.com
- Subject:
[SECURITY QUESTION] ...
- GitHub Issues: https://github.com/adrian207/Audit-Azure/issues
- GitHub Discussions: https://github.com/adrian207/Audit-Azure/discussions
This security policy may be updated periodically. Material changes will be announced in:
- Release notes
- README.md
- GitHub security advisories
Last Updated: October 28, 2025
Version: 1.0
- Setup Guide - Secure deployment instructions
- API Reference - API security features
- Contributing Guide - Secure coding practices
Thank you for helping keep Audit-Azure and its users safe! π
Author: Adrian Johnson adrian207@gmail.com
Project: https://github.com/adrian207/Audit-Azure
License: MIT