Security updates are provided for the following versions:
| Version | Supported |
|---|---|
| 1.1.x | β Yes |
| 1.0.x | β Yes |
| < 1.0 | β No |
If you discover a security vulnerability in server-scripts-cli, please report it responsibly:
- DO NOT open a public GitHub issue for security vulnerabilities
- Email the maintainer directly: marc.allgeier@proton.me
- Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial Response: Within 48 hours of report
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: Hotfix within 7 days
- High: Patch within 14 days
- Medium/Low: Next minor release
- Coordinated Disclosure: We follow responsible disclosure practices
- Credit: Security researchers will be credited (if desired)
- Public Disclosure: After fix is released and users have time to update (typically 30 days)
server-scripts-cli executes shell scripts defined in the manifest. Security best practices:
- Review Scripts: Always review scripts before adding to manifest
- Root Privileges: Use
requires_root: trueonly when necessary - Input Validation: Scripts should validate user input
- Path Safety: Use absolute paths in scripts
- Source Control: Keep
manifest.yamlin version control - Validation: Run
ssc validateregularly - Untrusted Sources: Do not import manifests from untrusted sources
- Verify Source: Only install from official repository or releases
- HTTPS Only: Use HTTPS URLs for installation (
https://github.com/fidpa/server-scripts-cli) - Check Signatures: Verify GPG signatures when available (future feature)
ssc run executes scripts with the user's permissions. Scripts with requires_root: true will prompt for sudo.
Mitigation: Review scripts before execution, use ssc info <name> to inspect metadata.
Malicious YAML in manifest.yaml could cause unexpected behavior.
Mitigation: Only edit manifest via trusted sources, use ssc validate to check integrity.
ssc run uses safe execution patterns to prevent command injection.
Current Status: No known vulnerabilities (as of v1.1.1)
- Review scripts before adding to manifest
- Use
requires_rootsparingly - Keep
server-scripts-cliupdated - Run
ssc validateafter manifest changes - Use version control for manifest
- Audit logs via
ssc logsregularly
- Input Validation: All user input is validated
- Safe Execution: Uses Bash best practices (
set -uo pipefail) - Root Detection: Requires explicit
requires_root: trueflag - Manifest Validation: Built-in integrity checks
We thank the security community for responsible disclosure and collaboration.
Last Updated: 2026-01-20 Contact: marc.allgeier@proton.me