| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
We only provide security fixes for the latest release. We recommend always using the most recent version.
We take the security of esec seriously. If you believe you have found a security vulnerability, please report it responsibly.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via GitHub Security Advisories.
Alternatively, you can email the maintainer directly at: oss@mscno.dev
Please include the following information in your report:
- Type of vulnerability (e.g., key exposure, cryptographic weakness, injection)
- Full paths of source file(s) related to the vulnerability
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact assessment of the vulnerability
- Initial Response: Within 3 business days
- Status Update: Within 7 business days
- Resolution Target: Within 30 days for critical issues
- Acknowledgment: We will acknowledge receipt of your vulnerability report
- Assessment: We will investigate and assess the severity
- Updates: We will keep you informed of our progress
- Resolution: We will work on a fix and coordinate disclosure
- Credit: We will credit you in the release notes (unless you prefer anonymity)
The following are in scope for security reports:
- Cryptographic vulnerabilities in the encryption/decryption process
- Private key exposure or leakage
- Authentication or authorization bypasses
- Command injection in the
runcommand - Path traversal vulnerabilities
- Dependencies with known security vulnerabilities
- Vulnerabilities in dependencies that don't affect esec's functionality
- Issues that require physical access to the user's machine
- Social engineering attacks
- Denial of service attacks that require significant resources
When using esec:
- Never commit
.esec-keyringor private keys to version control - Add to
.gitignore:.esec-keyring - Use environment-specific keys for different deployments
- Rotate keys periodically, especially after team member departures
- Verify release artifacts using the instructions in VERIFICATION.md
All releases are signed and include provenance attestations. See VERIFICATION.md for instructions on verifying release artifacts.