Skip to content

Security: aether-framework/aether-datafixers

SECURITY.md

Security Policy

Supported Versions

We provide security updates for the following versions:

Version Support Status End of Support
1.0.x πŸ”œ Planned LTS TBD (1 year)
0.5.x βœ… Active Support February 2026
0.4.x ❌ End of Life -
0.3.x ❌ End of Life -
0.2.x ❌ End of Life -
0.1.x ❌ End of Life -

If you are using an older version, we strongly recommend upgrading to the latest stable release.


Security Features

Automated Security Scanning

This project uses multiple automated security tools:

  • GitHub CodeQL – Static Application Security Testing (SAST)
  • OWASP Dependency-Check – Known vulnerability detection in dependencies
  • GitHub Dependency Review – Pull request dependency analysis
  • Dependabot – Automated dependency updates

All scans are executed automatically in CI pipelines on every pull request and release build.


Supply Chain Security

Artifact Integrity & Signing

All official release artifacts of Aether Datafixers are cryptographically signed to guarantee integrity and authenticity.

  • All release artifacts are GPG signed
  • Signatures are generated during the release pipeline
  • Each published artifact is accompanied by a corresponding .asc signature file
  • Consumers can verify artifacts before usage

Example verification flow:

gpg --verify artifact.jar.asc artifact.jar

Unsigned or modified artifacts must not be trusted.


Signing Keys

  • A dedicated GPG key is used for automated GitHub releases and deployments
  • Release signing keys are separate from personal developer keys
  • Private key material is never committed to the repository
  • Keys are stored securely using CI secret management

The signing process is fully automated and enforced during release builds.


Reporting a Vulnerability

If you discover a security vulnerability in Aether Datafixers, please report it privately.

Contact


Disclosure Process

  1. Report the issue privately
  2. Acknowledgment within 48 hours
  3. Fix timeline provided within 7 days
  4. Critical vulnerabilities (CVSS β‰₯ 9.0): patch within 72 hours
  5. High severity (CVSS β‰₯ 7.0): patch within 14 days
  6. Security advisory published after resolution

Response Time SLA

Severity Acknowledgment Fix Timeline
Critical (CVSS 9.0–10.0) 24 hours 72 hours
High (CVSS 7.0–8.9) 48 hours 14 days
Medium (CVSS 4.0–6.9) 48 hours 30 days
Low (CVSS 0.1–3.9) 72 hours Next release

Security Best Practices

  • Always use the latest stable version
  • Verify GPG signatures of all downloaded artifacts
  • Enable automated dependency updates
  • Validate input data at system boundaries
  • Use appropriate DynamicOps implementations for untrusted data
  • Avoid sensitive data in logs
  • Review the attached SBOM for dependency transparency

Vulnerability Disclosure Policy

We follow a coordinated disclosure process:

  1. Private disclosure
  2. Fix development
  3. Advisory preparation
  4. Coordinated release
  5. Public disclosure after a grace period

Security Audits

Security audits are welcome.

  • Contact security@splatgames.de before starting
  • Follow responsible disclosure practices
  • Researchers may be credited with permission

PGP Key

For encrypted communication and release verification:

  • Key Purpose: Release artifact signing
  • Key ID: 37B59B93DC756EE8
  • Fingerprint: C6BE25BF2A4639A67A491EBD37B59B93DC756EE8
  • Accessable in repository: KEYS

Contact: security@splatgames.de


Thank you for helping keep Aether Datafixers secure.

There aren’t any published security advisories