| Version | Supported |
|---|---|
| latest | ✅ |
If you discover a security vulnerability in kubectl-readonly, please report it responsibly.
- Do NOT open a public issue for security vulnerabilities
- Email the maintainers directly or use GitHub's private vulnerability reporting
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Resolution timeline: Depends on severity, typically within 30 days
Security issues we care about:
- Command injection - Bypassing the allowlist to execute dangerous commands
- Secret exposure - Ways to extract secret values despite protections
- Privilege escalation - Using kubectl-readonly to gain unintended access
Out of scope:
- Issues that require the attacker to already have shell access
- Denial of service (this tool is not a network service)
- Issues in kubectl itself (report those to Kubernetes)
kubectl-readonly is designed with a "deny by default" philosophy:
- Only explicitly allowlisted commands can execute
- Secret values are protected even for read operations
- No shell interpretation of arguments (prevents injection)
- Control characters in arguments are blocked
For more details, see the Philosophy section in the README.