| Version | Supported |
|---|---|
| 0.1.x | ✅ Current release |
If you discover a security vulnerability in OpsPortal, please report it responsibly.
Do not open a public issue.
Instead, please email polprog.tech@gmail.com with:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge your report within 48 hours and aim to provide a fix or mitigation within 7 days for critical issues.
Security concerns relevant to OpsPortal include:
- Iframe embedding / CSP bypass — unauthorized framing or content injection
- CSRF attacks — bypassing the double-submit cookie protection
- Path traversal in config file resolution or artifact serving
- Command injection via subprocess tool launching
- Sensitive data leakage — internal paths, tokens, or config values exposed in UI or logs
- Dependency vulnerabilities in third-party packages