| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ❌ |
If you discover a security vulnerability, please report it responsibly:
- Do not open a public GitHub issue for security vulnerabilities
- Use GitHub's private vulnerability reporting to submit your report
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 48 hours and provide a detailed response within 7 days.
- All incoming webhooks are validated using HMAC-SHA256 signatures
- Invalid signatures are rejected with 401 Unauthorized
- The
MIST_WEBHOOK_SECRETshould be a strong, randomly generated string
- API keys and passwords are read from environment variables, not code
- Use
PA_USERNAME/PA_PASSWORDfor auto-generated keys (preferred over static keys) - Ensure
/etc/mist-userid/envhas restricted permissions (chmod 600)
- Use HTTPS for PA firewall connections (certificate validation enabled by default)
- Consider running behind a reverse proxy with TLS termination
- The webhook endpoint should only be accessible from Mist cloud IPs
The included systemd units apply security hardening:
NoNewPrivileges=yesProtectSystem=strictPrivateTmp=yes- Memory limits to prevent resource exhaustion
- Run with least-privilege PA service account
- Use dedicated Redis instance (not shared with other services)
- Monitor the dead-letter queue for failed operations
- Rotate PA credentials periodically
- Keep the software updated