Core Platform is currently in active development. Security updates are provided for:
| Version | Supported | Notes |
|---|---|---|
| main | โ | Latest development version |
| < 1.0.0 | โ | Pre-release, active security fixes |
Note: This project is in active development. Once v1.0.0 is released, we will maintain security updates for the latest stable release and the previous major version.
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
For sensitive security issues, please report privately:
- GitHub Security Advisory: Use GitHub's private vulnerability reporting
- Email: Send details to martin.horak@muriel.cz with subject "SECURITY: core-platform"
Please provide:
- Description of the vulnerability
- Steps to reproduce
- Affected versions/components
- Potential impact
- Suggested fix (if available)
- Initial Response: Within 48 hours
- Status Updates: Every 7 days until resolved
- Fix Timeline: Critical issues within 7 days, others within 30 days
We appreciate responsible disclosure:
- Security researchers will be credited in release notes (if desired)
- We follow coordinated disclosure practices
- Public disclosure after fix is available
The following are NOT considered vulnerabilities:
- Issues in development/demo environments
- Social engineering attacks
- Physical attacks on infrastructure
- Denial of Service (DoS) attacks on demo instances
- Issues requiring physical access to servers
When deploying Core Platform:
- Never commit secrets - Use environment variables and secrets management
- Keep dependencies updated - Run
make verifyregularly - Enable HTTPS - Always use TLS in production
- Database security - Use separate credentials per service (see
DB_SEPARATE_USERS_PLAN.md) - Regular audits - Review
SECURITY_CONFIG_AUDIT.mdfor security configuration
- JWT-based authentication via Keycloak
- Multi-tenant isolation with separate database schemas
- CORS protection
- SQL injection prevention (Hibernate/JPA)
- Secrets scanning (gitleaks)
- Dependency vulnerability scanning (OWASP Dependency-Check)
- Static analysis (CodeQL, SonarQube)
- Container security scanning
For more details, see our Security Configuration Audit.