| Version | Supported |
|---|---|
| Latest release | ✅ |
| Older releases | ❌ |
Only the latest release receives security updates. Please upgrade to the latest version before reporting issues.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via GitHub Security Advisories.
You should receive a response within 72 hours. If for some reason you do not, please follow up to ensure the report was received.
- Type of vulnerability (e.g., remote code execution, state data leak, authentication bypass).
- Full paths of source file(s) related to the issue.
- Location of the affected source code (tag/branch/commit or direct URL).
- Step-by-step instructions to reproduce the issue.
- Proof-of-concept or exploit code (if available).
- Impact of the issue, including how an attacker might exploit it.
- Acknowledgement — within 72 hours.
- Assessment — we will evaluate severity and impact.
- Fix — a patch will be developed and tested.
- Disclosure — a security advisory will be published alongside the fix release.
We follow coordinated disclosure. Please give us reasonable time to address the vulnerability before public disclosure.
When using Ghoten with the ORAS backend:
- Enable state encryption — encrypts state before it leaves your machine.
- Keep OCI repositories private with least-privilege access tokens.
- Use registries that provide encryption at rest and audit trails.
- Rotate credentials regularly.
- Be mindful of state version retention — longer history increases exposure surface.
This security policy covers:
- The Ghoten binary and its source code.
- The ORAS backend implementation.
- Official Docker images published to
ghcr.io/vmvarela/ghoten.
It does not cover:
- Third-party providers or modules.
- OCI registries themselves (report issues to the registry provider).
- Upstream OpenTofu vulnerabilities (report to OpenTofu security).