| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in mkunit, please report it responsibly:
- Do not open a public GitHub issue
- Email the maintainer directly with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
You can expect:
- Acknowledgment within 48 hours
- Status update within 7 days
- Credit in the security advisory (unless you prefer anonymity)
mkunit interacts with systemd and can:
- Create/modify unit files in user or system directories
- Execute
systemctlandjournalctlcommands - Read environment variables
- Launch external editors
- Review generated unit files before installing with
--dry-run - Use
--hardeningflag for services that don't need full system access - Avoid storing secrets in unit files; use
EnvironmentFileinstead - System units (
--system) require appropriate permissions
- Unit file validation is basic; use
systemd-analyze verifyfor thorough checks - The tool trusts user input for paths and commands
- Editor integration inherits the security context of the shell