Supported Versions

Only the latest release of stracectl receives security updates — older releases are not backported.

Reporting a Vulnerability

Please do not open a public GitHub issue for security vulnerabilities.

To report a vulnerability, use one of the following methods:

  • GitHub Private Security Advisory — open a private advisory directly in the repository. This is the preferred method.
  • Email — contact the maintainer directly via the email listed in the GitHub profile @fabianoflorentino.

What to include in your report

  • A clear description of the vulnerability and the potential impact.
  • Steps to reproduce or a proof-of-concept.
  • The version(s) affected.
  • Any suggested mitigation or fix (optional).

What to expect

TimelineAction
Within 48 hoursAcknowledgement of the report.
Within 7 daysInitial assessment and severity classification.
Within 30 daysFix released or a mitigation plan communicated to you.

If the vulnerability is accepted, a CVE will be requested and a patched release will be published along with a public disclosure in the GitHub Security Advisories tab.

If the vulnerability is declined, you will receive an explanation of why it was not considered a security issue.

Scope

The following are considered in scope:

  • Code within this repository (cmd/, internal/, main.go).
  • The official Docker image published to fabianoflorentino/stracectl on Docker Hub.
  • The Helm chart under deploy/helm/stracectl.

Dependencies (Go modules, base Docker images) that are vulnerable should be reported to their respective upstream projects. We keep dependencies up to date via Dependabot.