Version | Supported |
---|---|
0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability within Datadog Monitor Deployer, please follow these steps:
- Do NOT disclose the vulnerability publicly
- Send a detailed report to [email protected]
- Include steps to reproduce the vulnerability
- Wait for our response and cooperation in addressing the issue
We aim to respond to security reports within 48 hours and will work with you to understand and resolve the issue promptly.
When using this tool:
- Never commit API keys or sensitive credentials to version control
- Use environment variables or secure secret management for credentials
- Regularly update dependencies to patch security vulnerabilities
- Follow the principle of least privilege when configuring monitor permissions
- Regularly audit your monitor configurations and access controls
Thank you for helping keep Datadog Monitor Deployer secure!