We actively maintain security updates for the following versions:
Version | Supported |
---|---|
1.x.x | ✅ |
0.9.x | ❌ |
< 0.9 | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability in ProxyND, please report it responsibly.
- DO NOT create a public GitHub issue for security vulnerabilities
- Send an email to
[email protected]
with:- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Acknowledgment: We will acknowledge receipt within 24 hours
- Initial Assessment: Initial assessment within 72 hours
- Progress Updates: Regular updates every 7 days until resolution
- Resolution Timeline:
- Critical: 24-48 hours
- High: 3-7 days
- Medium: 14-30 days
- Low: 30-90 days
- We follow coordinated disclosure
- Security fixes will be released as soon as possible
- Public disclosure after fix is available and deployed
- Credit will be given to reporters (unless they prefer anonymity)
- Keep Updated: Always use the latest stable version
- Secure Configuration:
- Use HTTPS for all endpoints
- Enable authentication for admin endpoints
- Configure proper firewall rules
- Monitor Logs: Regularly check access and error logs
- Resource Limits: Set appropriate resource limits
-
Code Security:
- Run
gosec
before committing - Use
go mod tidy
to keep dependencies clean - Validate all user inputs
- Use prepared statements for database queries
- Run
-
Dependencies:
- Regularly update dependencies
- Use
nancy
to scan for vulnerabilities - Pin dependency versions
-
Secrets Management:
- Never commit secrets to version control
- Use environment variables or secret management systems
- Rotate credentials regularly
- TLS/HTTPS: All communications encrypted
- Authentication: Multiple authentication methods supported
- Authorization: Role-based access control
- Input Validation: All inputs validated and sanitized
- Rate Limiting: Protection against abuse
- Security Headers: Standard security headers included
# Example secure configuration
server:
tls:
enabled: true
cert_file: "/etc/ssl/certs/proxynd.crt"
key_file: "/etc/ssl/private/proxynd.key"
auth:
enabled: true
method: "jwt"
security:
rate_limit:
enabled: true
requests_per_minute: 100
cors:
enabled: true
allowed_origins: ["https://trusted-domain.com"]
- Base images regularly updated
- Non-root user execution
- Minimal attack surface
- Security scanning in CI/CD
ProxyND is designed to help meet:
- OWASP Top 10: Protection against common web vulnerabilities
- CIS Controls: Implementation of critical security controls
- NIST Framework: Alignment with cybersecurity framework
- Security Team: [email protected]
- PGP Key: Available at https://proxynd.example.com/.well-known/pgp-key.txt
- Security Updates: https://github.com/[repository]/security/advisories
We acknowledge security researchers who have helped improve ProxyND's security:
Last Updated: 2024-07-17
Review Schedule: Quarterly