Skip to content

Security: omerap12/keda

Security

SECURITY.md

Security Policy

Prevention

We have a few preventive measures in place to detect security vulnerabilities:

  • Renovate & Dependabot help us keep our dependencies up-to-date to patch vulnerabilities as soon as possible by creating awareness and automated PRs.
  • Snyk helps us ship secure container images:
    • Images are scanned in every pull request (PR) to detect new vulnerabilities.
    • Published images on GitHub Container Registry are monitored to detect new vulnerabilities so we can ship patches
  • Whitesource Bolt for GitHub helps us with identifying vulnerabilities in our dependencies to raise awareness.
  • Trivy helps us with identifying vulnerabilities in our dependencies and docker images to raise awareness as part of our CI.
  • Semgrep helps us with identifying vulnerabilities in our code and docker images to raise awareness as part of our CI.
  • GitHub's security features are constantly monitoring our repo and dependencies:
    • All pull requests (PRs) are using CodeQL to scan our source code for vulnerabilities
    • Dependabot will automatically identify vulnerabilities based on GitHub Advisory Database and open PRs with patches
    • Automated secret scanning & alerts
  • The Scorecard GitHub Action automates the process by running security checks on the GitHub repository. By integrating this Action into the repository's workflow, we can continuously monitor the project’s security posture. The Scorecard checks cover various security best practices and provide scores for multiple categories. Some checks include Code Reviews, Branch Protection, Signed Releases, etc.

KEDA maintainers are working to improve our prevention by adding additional measures:

  • Scan changes to Helm charts in PRs (issue)

Disclosures

We strive to ship secure software, but we need the community to help us find security breaches.

In case of a confirmed breach, reporters will get full credit and can be keep in the loop, if preferred.

Private Disclosure Processes

We ask that all suspected vulnerabilities be privately and responsibly disclosed by contacting our maintainers.

Public Disclosure Processes

If you know of a publicly disclosed security vulnerability please IMMEDIATELY email the KEDA maintainers to inform about the vulnerability so they may start the patch, release, and communication process.

Compensation

We do not provide compensations for reporting vulnerabilities except for eternal gratitude.

Communication

GitHub Security Advisory will be used to communicate during the process of identifying, fixing & shipping the mitigation of the vulnerability.

The advisory will only be made public when the patched version is released to inform the community of the breach and its potential security impact.

There aren’t any published security advisories