Use this section to tell people about which versions of Wiki-Go are currently being supported with security updates.
| Version | Supported |
|---|---|
| latest | ✅ |
We take the security of Wiki-Go seriously. If you believe you've found a security vulnerability, please follow these steps:
- Do not disclose the vulnerability publicly or on the public issue tracker.
- Submit your findings through our contact form.
- Allow time for us to review and address the vulnerability before any public disclosure.
- We'll respond as quickly as possible to acknowledge receipt of your report.
Wiki-Go includes several security features:
- Password Storage: All passwords are hashed using bcrypt with appropriate cost factors.
- Authentication: Session-based authentication with secure, HTTP-only cookies.
- TLS Support: Built-in TLS support for encrypted connections.
- Role-Based Access Control: Fine-grained permissions through admin, editor, and viewer roles.
- File Upload Validation: MIME type checking for uploaded files (can be disabled if needed).
- Private Wiki Mode: Option to require authentication for all pages.
For secure deployment of Wiki-Go, we recommend:
- Always use HTTPS in production environments.
- Set
allow_insecure_cookies: false(the default) to enforce secure cookies. - Change the default admin password immediately after installation.
- Regularly update to the latest version for security patches.
- Use a reverse proxy like Nginx, Caddy, or Traefik for additional security layers.
- Back up your data regularly to prevent data loss.
- Set appropriate file upload size limits to prevent denial of service attacks.
- Implement rate limiting at the reverse proxy level to prevent brute force attacks.
Wiki-Go uses Go modules for dependency management. All dependencies are vendored to ensure reproducible builds.
Our security practices include:
- Regular code review with a focus on security
- Input validation to prevent injection attacks
- Proper error handling to avoid information leakage
- Use of standard libraries for cryptographic operations
- Secure session management
- Principle of least privilege for user roles
No known security issues at this time.
For security concerns, please use our contact form.