We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| > 1.0.x | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability within dee, please send an email to security@example.com. All security vulnerabilities will be promptly addressed.
Please do not report security vulnerabilities through public GitHub issues.
When reporting a vulnerability, please include:
- A description of the vulnerability
- Steps to reproduce the issue
- Possible impact of the vulnerability
- Any suggested fixes (if you have them)
- We will acknowledge receipt of your vulnerability report within 48 hours
- We will provide a more detailed response within 7 days
- We will work on a fix and release schedule based on the severity of the issue
- dee stores environment variables in plain text YAML files in
~/.dee/ - These files should be protected with appropriate file system permissions (0600)
- Consider using encrypted storage solutions for highly sensitive environments
- Always validate schemas before using them in production
- Be cautious with regex patterns that could lead to ReDoS attacks
- Test inheritance chains to prevent circular dependencies
- The install script downloads binaries over HTTPS
- Always verify checksums when downloading manually
- Consider using internal mirrors for corporate environments
- File Permissions: Ensure your
~/.dee/directory has restricted permissions - Backup Security: If backing up configurations, ensure backups are encrypted
- Access Control: Limit access to configuration files containing sensitive data
- Regular Updates: Keep dee updated to the latest version
- Environment Separation: Use separate schemas for different security contexts
We follow responsible disclosure principles:
- Report vulnerabilities privately first
- We will work with you to understand and address the issue
- We will credit you in the security advisory (unless you prefer to remain anonymous)
- We may request that you delay public disclosure until a fix is available