If you discover a security vulnerability, please use GitHub Security Advisories for this repository instead of opening a public issue.
Please include:
- Description of the vulnerability
- Steps to reproduce (if applicable)
- Potential impact
- Suggested fix (if any)
| Version | Supported |
|---|---|
| Latest | ✅ Yes |
| N-1 | ✅ Yes |
| Older | ❌ No |
This project uses the following security scanning tools:
- ShellCheck — Static analysis for shell scripts (detects unsafe patterns)
- CodeQL — SAST (Static Application Security Testing) and vulnerability detection
# ShellCheck lint (includes security warnings)
make lint
# Security-level ShellCheck scan
make security
# Syntax check
make vet
# All security + dev setup
make dev-setup # Installs all tools
make security # Run security scanSecurity scans run automatically on:
- Every pull request
- Before merge to main
- Weekly scheduled scan
- On push to main
This project is designed to prevent common shell script issues:
- Command injection — All variables are quoted
- Path traversal — Paths are validated before use
- Uninitialized variables —
set -ucatches these - Silent failures —
set -eandset -o pipefailcatch these - Unsafe temporary files — Use
mktempinstead of predictable paths
- Notify maintainers
- Wait for acknowledgment (within 48 hours)
- Provide reasonable time for fix (typically 30-90 days)
- Coordinated disclosure
- Follows responsible disclosure practices
- Reports processed with urgency
- Security patches released as soon as possible