| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability in DevSec, please report it responsibly.
- Do NOT create a public GitHub issue for security vulnerabilities
- Email the maintainers directly or use GitHub Security Advisories
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability and determine severity
- Updates: We will keep you informed of our progress
- Resolution: We aim to resolve critical issues within 7 days
- Credit: We will credit reporters in release notes (unless anonymity is requested)
- All code is scanned with
gosecfor security issues - Dependencies are monitored for vulnerabilities
- No secrets are committed to the repository
- All external input is validated
- Security scans run on every commit
- Dependencies are checked for known vulnerabilities
- Binaries are built with security flags
- Always use the latest version
- Verify checksums when downloading releases
- Review policies before deploying to production
- Follow least-privilege principles for scanner access
DevSec includes security features to help secure your CI/CD:
- Secret Detection: Scan for leaked credentials
- SAST: Static application security testing
- Vulnerability Scanning: Dependency and container vulnerabilities
- Policy Enforcement: OPA-based security policies
- SBOM Generation: Software bill of materials
- Artifact Signing: Cryptographic signing of artifacts
We use:
- Dependabot for dependency updates
- OSV for vulnerability scanning
- Trivy for container scanning
For security concerns, contact the maintainers through:
- GitHub Security Advisories
- Direct email to repository maintainers