| Version | Supported |
|---|---|
| 0.x | ✅ |
If you discover a security vulnerability in SwarmCLI, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please send an email to dev.konin@gmail.com with:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment within 48 hours
- Assessment within 7 days
- Fix or mitigation for confirmed vulnerabilities within 30 days
- Credit in the release notes (unless you prefer to remain anonymous)
- Never store secrets in
variables.yaml— use Docker Swarm Secrets viaexternals.yaml - Keep
.swarmcli.yamlout of version control (already in.gitignore) - Use deploy tokens with minimal scope for Git authentication
- Rotate credentials regularly
- Ensure
.secrets/directory has restricted permissions:chmod 700 .secrets/ - Secret files should be readable only by the deploy user:
chmod 600 .secrets/*
- SwarmCLI operates over SSH for remote deployments — ensure SSH keys are properly secured
- Use Docker overlay networks with encryption for sensitive traffic
- Restrict Docker socket access via socket proxy (e.g., tecnativa/docker-socket-proxy)
SECRETS_ROOTis enforced from.swarmcli.yamlonly — environment variable overrides are blocked- Git credentials are sanitized in error messages and logs
- Deployment locks prevent concurrent conflicting operations
- Signal handlers ensure graceful cleanup of sensitive temporary files