| Version | Supported |
|---|---|
| 1.x | ✅ |
| < 1.0 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
- Go to the Security Advisories page
- Click "Report a vulnerability"
- Provide detailed information about the vulnerability
Send vulnerability reports to: security@linuxfoundation.org
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Varies by severity
- Remote code execution
- Authentication bypass
- Privilege escalation
- Response: Immediate (24-48 hours)
- Information disclosure of sensitive data
- Denial of service
- Response: Within 7 days
- Minor information disclosure
- Security misconfiguration
- Response: Within 14 days
- Best practice violations
- Response: Next regular release
-
Use OAuth Ephemeral Keys (recommended)
- Automatic key rotation
- Short-lived credentials
- No manual key management
-
Rotate Legacy Auth Keys (if used)
- Rotate every 90 days maximum
- Use GitHub Secrets for storage
- Never commit keys to repositories
-
Limit Tailscale Permissions
- Use appropriate tags (
tag:bastion) - Configure restrictive ACLs
- Review access regularly
- Use appropriate tags (
-
Secure OpenStack Credentials
- Store in GitHub Secrets
- Use application credentials (not user passwords)
- Limit credential scope
-
Monitor Bastion Activity
- Review GitHub Actions logs
- Monitor Tailscale admin console
- Check OpenStack audit logs
-
Pin External Actions
- Use commit SHA pins, not tags
- Regularly update pinned versions
- Review changes before updating
-
Validate Inputs
- Never trust user input
- Sanitize all inputs
- Use input validation patterns
-
Handle Secrets Safely
- Never log secrets
- Use GitHub's secret masking
- Clear secrets after use
-
Follow Least Privilege
- Request minimum required permissions
- Scope credentials appropriately
- Use read-only when possible
- Risk: Compromised Tailscale credentials could allow network access
- Mitigation:
- Use OAuth ephemeral keys with 1-hour expiry
- Tag-based ACL restrictions
- Automatic cleanup on bastion teardown
- Risk: Leaked OpenStack credentials could allow resource creation
- Mitigation:
- Store in GitHub Secrets only
- Use application credentials with limited scope
- Monitor OpenStack activity
- Risk: Bastion could be used as attack vector
- Mitigation:
- Ephemeral bastions (destroyed after use)
- Tailscale network isolation
- No public IP exposure
- Risk: Malicious cloud-init could compromise bastion
- Mitigation:
- Template-based cloud-init generation
- Input validation and sanitization
- No dynamic code execution
Security updates are released:
- Critical: Immediately upon fix
- High: Within 7 days
- Medium/Low: Next regular release
Updates are announced via:
- GitHub Security Advisories
- Release notes
- README.md
We follow responsible disclosure:
- Private Disclosure: Reported vulnerabilities are kept confidential
- Coordinated Fix: Work with reporter to develop fix
- Public Disclosure: After fix is released (or 90 days, whichever comes first)
- Credit: Reporter credited in security advisory (if desired)
- ✅ OAuth credential management
- ✅ Ephemeral auth keys with expiry
- ✅ Automatic bastion cleanup
- ✅ Network isolation via Tailscale
- ✅ Input validation and sanitization
- ✅ Secret masking in logs
- ✅ REUSE compliance for licensing
- ✅ SHA-pinned external dependencies (some workflows)
- Full SHA pinning of all external actions
- Automated security scanning in CI
- Dependency vulnerability scanning
- SBOM (Software Bill of Materials) generation
This project follows:
- OpenSSF Best Practices
- REUSE Specification
- Linux Foundation security guidelines
For security questions: security@linuxfoundation.org For general questions: Use GitHub Discussions
Last Updated: 2025-10-20 Security Policy Version: 1.0