| Version | Supported |
|---|---|
| 1.0.0 | ✅ |
If you discover a security vulnerability in Checkwise, please report it privately to maintain the security of our users.
- GitHub Security Advisories: Use GitHub's private vulnerability reporting
- Email: Contact the maintainer through GitHub for private communication
- Issue: For non-critical security concerns, you may create a public issue
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if any)
- Your contact information for follow-up
- Initial Response: Within 48 hours
- Status Updates: Every 72 hours until resolved
- Resolution: Critical issues within 7 days, others within 30 days
We follow responsible disclosure practices. Please allow us time to address the issue before public disclosure. We will coordinate with you on the disclosure timeline.
Checkwise handles sensitive information and operates in security-critical environments:
- GitHub tokens (read-only repository access)
- YAML configuration files
- GitHub API interactions
- File path information
- Input Validation: Comprehensive validation of all inputs
- Path Traversal Prevention: Blocks
../patterns and absolute paths - Token Security: Secure token handling without logging
- YAML Safety: Safe YAML parsing preventing code injection
- API Security: Proper GitHub API authentication and rate limiting
- Token Permissions: Use minimal required permissions for GitHub tokens
- Token Storage: Store tokens securely in GitHub Secrets, never in code
- Regular Updates: Keep the action updated to the latest version
- Configuration Review: Regularly audit your configuration files
- Access Control: Limit who can modify workflow files and configurations
- Repository code and metadata
- GitHub tokens and authentication
- Configuration data
- CI/CD pipeline integrity
- Malicious configuration injection
- Token exposure or misuse
- Path traversal attacks
- YAML injection attacks
- Denial of service through resource exhaustion
- Strict input validation and sanitization
- Secure defaults and fail-safe behaviors
- Comprehensive error handling
- Rate limiting and resource management
- Security-focused code review and testing
Security updates will be released as patch versions and will be clearly marked in the changelog. Critical security updates may be released outside the normal release schedule.
- GitHub Security Advisories
- Release notes and changelog
- Repository discussions for major security updates
Checkwise undergoes regular security testing including:
- Static code analysis for security vulnerabilities
- Dependency vulnerability scanning
- Input validation testing
- Authentication and authorization testing
Checkwise is designed to support organizations with security and compliance requirements:
- No sensitive data logging
- Minimal privilege requirements
- Audit trail through GitHub Actions logs
- Transparent operation and source code availability