The following versions of gpud are currently supported with security updates:
| Version | Supported |
|---|---|
| latest | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue in gpud, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
- Email: [email protected]
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours.
- Communication: We will keep you informed of the progress toward a fix and full announcement.
- Credit: We will credit you in the security advisory if you wish (please let us know your preference).
- Timeline: We aim to release a fix within 90 days of the initial report, depending on the severity and complexity.
We prefer all communications to be in English.
When deploying gpud in production environments, we recommend:
- Run with least privileges: Use non-root users where possible
- Network isolation: Restrict network access to the gpud API endpoints
- Keep updated: Regularly update to the latest version for security patches
- Audit logs: Enable and monitor gpud logs for suspicious activity
- Container security: When running in Docker, follow container security best practices
Security advisories will be published through:
- GitHub Security Advisories on this repository
- Release notes for versions containing security fixes
We would like to thank the following security researchers for their responsible disclosure:
None yet - be the first!