We actively support the following versions of Dependabot Configurator:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
We take security vulnerabilities seriously. If you discover a security vulnerability in Dependabot Configurator, please report it responsibly.
Please do not report security vulnerabilities through public GitHub issues.
As mentioned in our responsible disclosure policy we do not have a bug bounty program or offer any compensation for vulnerability reports but we do appreciate you reporting issues!
- Email: Send details to security@redcanary.com
- Private disclosure: Use GitHub's private vulnerability reporting feature
When reporting a vulnerability, please include:
- Description: Clear description of the vulnerability
- Impact: Potential impact and attack scenarios
- Reproduction: Steps to reproduce the vulnerability
- Environment: Affected versions and configurations
- Proof of Concept: Code or screenshots demonstrating the issue (if applicable)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Updates: We will provide regular updates on our progress
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- We request that you give us reasonable time to investigate and fix the vulnerability before public disclosure
- We will coordinate with you on the timing of public disclosure
- We will credit you for the discovery (unless you prefer to remain anonymous)
When using Dependabot Configurator:
- Keep Updated: Always use the latest version
- Secure Secrets: Properly manage GitHub App credentials
- Review Changes: Review all generated configurations before deployment
- Monitor Logs: Monitor workflow execution logs for anomalies
- Limit Permissions: Use minimal required permissions for GitHub Apps
When contributing to Dependabot Configurator:
- Secure Coding: Follow secure coding practices
- Input Validation: Validate all inputs and environment variables
- Dependency Management: Keep dependencies updated and secure
- Secret Handling: Never commit secrets or credentials
- Code Review: All changes require security-focused code review
- Uses short-lived tokens (10 minutes maximum)
- Implements granular permissions
- Supports organization-level access control
- All GitHub Actions are pinned to SHA256 hashes
- Automated pinning via
pinacttool - Regular security updates for action dependencies
- Minimal required permissions for each job
- Secure handling of secrets and tokens
- Input validation for all workflow parameters
- Structured logging prevents information leakage
- Environment variable validation
- Secure file handling practices
The GitHub App requires the following permissions:
- Contents: Write access for creating/updating files
- Pull Requests: Write access for creating pull requests
- Issues: Write access for managing labels
- Workflows run with repository write permissions
- Self-hosted runners may have additional security considerations
- Generated configurations should be reviewed before deployment
- Python dependencies managed via Poetry with lock files
- Regular dependency updates via Dependabot
- Security scanning of dependencies
Security updates will be:
- Released as patch versions when possible
- Documented in release notes with severity levels
- Communicated through GitHub Security Advisories for critical issues
For security-related questions or concerns, please contact the project maintainers through the appropriate channels mentioned above.
Thank you for helping keep Dependabot Configurator secure!