| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability in this project, please report it to us privately before disclosing it publicly.
- Email us at: security@example.com
- Include "Security Vulnerability" in the subject line
- Provide as much detail as possible about the vulnerability
- Type of vulnerability (e.g., XSS, SQL injection, etc.)
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any screenshots or proof-of-concept code (if available)
We will acknowledge receipt of your vulnerability report within 48 hours and provide a detailed response within 7 days.
- Never share your Azure credentials or service principal details
- Use least-privilege access when running the script
- Review the script before executing it in production environments
- Keep your Azure CLI and PowerShell modules up to date
- Use Azure Key Store for managing secrets instead of hardcoding them
This script includes several security measures:
- No hardcoded credentials
- Support for Azure AD authentication
- Validation of input parameters
- Secure handling of resource configurations
Security updates will be announced through:
- GitHub releases
- Security advisories
- Commit messages tagged with
security
This tool is provided as-is, and users are responsible for:
- Securing their Azure environment
- Following Azure security best practices
- Reviewing and understanding the script before execution
- Implementing additional security measures as needed
For more information about Azure security best practices, visit: Azure Security Documentation