KEDA commits to supporting the n-2 version minor version of the current major release; as well as the last minor version of the previous major release.
Here's an overview:
Version | Supported |
---|---|
2.0.x | ✅ |
1.5.x | ✅ |
< 1.5 | ❌ |
We have a few preventive measures in place to detect security vulnerabilities:
- Renovate helps us keep our dependencies up-to-date to patch vulnerabilities as soon as possible.
- Snyk helps us ship secure container images:
- Images are scanned in every pull request (PR) to detect new vulnerabilities.
- Published images on GitHub Container Registry are monitored to detect new vulnerabilities so we can ship patches
- Whitesource Bolt for GitHub helps us with identifying vulnerabilities in our dependencies to raise awareness.
- Trivy helps us with identifying vulnerabilities in our dependencies and docker images to raise awareness as part of our CI.
- Semgrep helps us with identifying vulnerabilities in our code and docker images to raise awareness as part of our CI.
- GitHub's security features are constantly monitoring our repo and dependencies:
- All pull requests (PRs) are using CodeQL to scan our source code for vulnerabilities
- Dependabot will automatically identify vulnerabilities based on GitHub Advisory Database and open PRs with patches
KEDA maintainers are working to improve our prevention by adding additional measures:
- Scan changes to Helm charts in PRs (issue)
We strive to ship secure software, but we need the community to help us find security breaches.
In case of a confirmed breach, reporters will get full credit and can be keep in the loop, if preferred.
We ask that all suspected vulnerabilities be privately and responsibly disclosed by contacting our maintainers.
If you know of a publicly disclosed security vulnerability please IMMEDIATELY email the KEDA maintainers to inform about the vulnerability so they may start the patch, release, and communication process.
We do not provide compensations for reporting vulnerabilities except for eternal gratitude.
GitHub Security Advisory will be used to communicate during the process of identifying, fixing & shipping the mitigation of the vulnerability.
The advisory will only be made public when the patched version is released to inform the community of the breach and its potential security impact.