| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability, please report it responsibly:
- Do not open a public issue
- Email the maintainer directly or use GitHub's private vulnerability reporting
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
When using these Terraform modules:
- Never commit sensitive values (API keys, passwords) to version control
- Use Terraform variables and environment variables for secrets
- Enable state encryption for remote backends
- Review module changes before applying updates
- Use version pinning for production deployments
-
Use environment variables for credentials instead of hardcoding in
.tffiles:export TURINGPI_USERNAME="root" export TURINGPI_PASSWORD="your-password"
-
Never commit
terraform.tfstatefiles containing credentials to version control- Add
*.tfstateand*.tfstate.backupto.gitignore - Use remote state backends with encryption (S3, GCS, Terraform Cloud)
- Add
-
Use HTTPS endpoints (the default) for BMC communication
-
Enable TLS verification (default) - only use
insecure = truein development environments
This repository implements security best practices:
- Pinned Actions: All GitHub Actions are pinned to SHA commits
- Dependabot: Automated security updates for Terraform providers and GitHub Actions
- Signed Releases: All releases are GPG-signed tags
- Branch Protection: Main branch requires review and passing CI
- Security Scanning: Trivy IaC scanning and dependency review on all PRs
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Release: Depends on severity and complexity