We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability within Enarro, please send an email to the maintainers. All security vulnerabilities will be promptly addressed.
Please do not report security vulnerabilities through public GitHub issues.
When reporting a vulnerability, please include:
- Type of vulnerability
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability, including how an attacker might exploit it
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity and complexity
- Security issues will be disclosed after a fix is available
- Credit will be given to the reporter (unless they wish to remain anonymous)
- A security advisory will be published on GitHub
When deploying Enarro:
- Use HTTPS - Always use TLS/SSL in production
- Secure Secrets - Never commit secrets to version control
- Update Dependencies - Keep all NuGet packages up to date
- Database Security - Use strong passwords and restrict network access
- API Keys - Rotate API keys regularly
- Health Checks - Monitor health endpoints for anomalies
- Logging - Review logs regularly for suspicious activity
- Rate Limiting - Implement rate limiting to prevent abuse
- Authentication: Phase 4 will add JWT authentication (currently not implemented)
- Authorization: Phase 4 will add role-based access control
- Rate Limiting: Phase 4 will add API rate limiting
- Input Validation: Basic validation is implemented, enhanced validation planned
Until Phase 4 is complete, we recommend:
- Deploy behind a reverse proxy with authentication
- Use network-level access controls
- Implement rate limiting at the infrastructure level
- Monitor API usage closely
- Restrict file upload sizes and types
We regularly update dependencies to patch security vulnerabilities. Run:
dotnet list package --vulnerableTo check for vulnerable packages.
For security concerns, please contact the project maintainers through GitHub issues (for non-sensitive matters) or via email for sensitive security issues.