| Version | Supported |
|---|---|
| 1.x | ✅ |
| < 1.0 | ❌ |
We take the security of statekit seriously. If you discover a security vulnerability, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities
- Use GitHub's private vulnerability reporting:
- Go to the Security tab
- Click "Report a vulnerability"
- Provide a detailed description of the vulnerability
- A clear description of the vulnerability
- Steps to reproduce the issue
- Affected versions
- Any potential mitigations you've identified
- Your contact information (optional, for follow-up questions)
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Assessment: We will investigate and assess the severity within 7 days
- Resolution: We aim to release a fix within 30 days for critical vulnerabilities
- Disclosure: We will coordinate with you on public disclosure timing
The following are in scope for security reports:
- The statekit library (
github.com/felixgeelhaar/statekit) - All sub-packages (http, otel, viz, health, metrics, etc.)
- The CLI tool (
cmd/statekit) - Example code in the
examples/directory
- Vulnerabilities in dependencies (report these to the respective maintainers)
- Issues in documentation or non-code assets
- Social engineering attacks
When using statekit in your applications:
- Validate event payloads before processing
- Use context timeouts for distributed interpreters
- Implement proper access controls when using HTTP handlers
- Store sensitive context data securely (encryption at rest)
- Review action and guard implementations for injection vulnerabilities
We use Dependabot to monitor and update dependencies. Security updates are prioritized and typically merged within 24-48 hours of notification.