We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 0.6.x | ✅ |
| < 0.6 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
-
GitHub Security Advisories (Preferred)
- Go to the Security Advisories page
- Click "New draft security advisory"
- Fill in the details and submit
-
Email
- Send details to the repository maintainers
- Include "SECURITY" in the subject line
Please include the following information in your report:
- Description: A clear description of the vulnerability
- Impact: The potential impact of the vulnerability
- Steps to Reproduce: Detailed steps to reproduce the issue
- Affected Versions: Which versions are affected
- Suggested Fix: If you have one (optional)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Initial Assessment: We will provide an initial assessment within 7 days
- Resolution Timeline: We aim to resolve critical issues within 30 days
- Credit: We will credit reporters in the security advisory (unless you prefer to remain anonymous)
This security policy applies to:
- The Rhiza template system and configuration files
- GitHub Actions workflows provided by this repository
- Shell scripts in
.rhiza/scripts/ - Python utilities in
.rhiza/utils/
The following are generally out of scope:
- Vulnerabilities in upstream dependencies (report these to the respective projects)
- Issues that require physical access to a user's machine
- Social engineering attacks
- Denial of service attacks that require significant resources
This project implements several security measures:
- CodeQL: Automated code scanning for Python and GitHub Actions
- Bandit: Python security linter integrated in CI and pre-commit
- pip-audit: Dependency vulnerability scanning
- SLSA Provenance: Build attestations for release artifacts (public repositories only)
- Locked Dependencies:
uv.lockensures reproducible builds - Renovate: Automated dependency updates with security patches
- OIDC Publishing: PyPI trusted publishing without stored credentials
- Signed Commits: GPG signing supported for releases
- Tag Protection: Releases require version tag validation
When using Rhiza templates in your projects:
- Keep Updated: Regularly sync with upstream templates
- Review Changes: Review template sync PRs before merging
- Enable Security Features: Enable CodeQL and Dependabot in your repositories
- Use Locked Dependencies: Always commit
uv.lockfor reproducible builds - Configure Branch Protection: Require PR reviews and status checks
We thank the security researchers and community members who help keep Rhiza secure.