We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
The Code3Tech team takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by email to:
Please include the following information:
- Type of vulnerability
- Full paths of source file(s) related to the manifestation of the vulnerability
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Communication: We will send you regular updates about our progress
- Timeline: We aim to patch critical vulnerabilities within 7 days
- Credit: If you wish, we will publicly acknowledge your responsible disclosure
- Receive Report: Security vulnerability reported via email
- Validate: Confirm the vulnerability and assess its severity
- Develop Fix: Create and test the security patch
- Release: Deploy the security fix in a new version
- Announce: Publish security advisory with details
- Credit: Acknowledge the reporter (if desired)
When using this collection, we recommend:
- Keep Updated: Always use the latest version of the collection
- Review Changes: Review CHANGELOG.md for security-related updates
- Principle of Least Privilege: Run Ansible with minimum required privileges
- Secure Storage: Store sensitive data (passwords, keys) in Ansible Vault
- Network Security: Use SSH keys instead of passwords for authentication
- Rootless Mode: Use rootless containers when possible
- User Namespaces: Configure user namespace remapping
- Resource Limits: Set appropriate resource limits for containers
- Network Isolation: Use network namespaces and proper firewall rules
- Image Security: Use trusted base images and scan for vulnerabilities
# Example: Secure Docker configuration
docker_daemon_config:
live-restore: true
userland-proxy: false
no-new-privileges: true
userns-remap: default# Example: Secure Podman rootless configuration
podman_enable_rootless: true
podman_rootless_users:
- "{{ ansible_user }}"Never commit secrets to git!
Use Ansible Vault for sensitive data:
# Create encrypted file
ansible-vault create secrets.yml
# Edit encrypted file
ansible-vault edit secrets.yml
# Use in playbook
ansible-playbook playbook.yml --ask-vault-pass- Docker Socket: Mounting
/var/run/docker.sockin containers gives root access - Privileged Containers: Should be avoided in production
- Network Exposure: Be careful with port mappings
- Rootless Limitations: Some features require root privileges
- User Namespace: Properly configure subuid/subgid ranges
- SELinux: Ensure proper SELinux context on RHEL-based systems
Before using this collection in production:
- Review all default variables in
defaults/main.yml - Configure firewall rules appropriately
- Enable rootless mode for containers (when possible)
- Use Ansible Vault for sensitive data
- Review and customize daemon configuration
- Implement proper backup procedures
- Set up monitoring and alerting
- Document your security configuration
- Test disaster recovery procedures
- Keep collection and dependencies updated
We follow a 90-day disclosure timeline:
- Day 0: Vulnerability reported
- Day 7: Security patch released (for critical vulnerabilities)
- Day 30: Security patch released (for medium/low vulnerabilities)
- Day 90: Full public disclosure (if not patched earlier)
Security advisories are published at:
- GitHub Security Advisories: https://github.com/kode3tech/ansible-col-devtools/security/advisories
- Collection README.md
- CHANGELOG.md
- Security Email: suporte@kode3.tech
- General Issues: https://github.com/kode3tech/ansible-col-devtools/issues
- Website: https://github.com/kode3tech
We would like to thank the following individuals for responsibly disclosing security vulnerabilities:
- No vulnerabilities reported yet
Thank you for helping keep code3tech.devtools secure! 🔒