Skip to content

grcengineering/cvm

Repository files navigation

Security Policy

Supported Versions

Version Supported
0.1.x Yes

Reporting a Vulnerability

If you discover a security vulnerability in CVM, please report it responsibly:

  1. Do NOT open a public GitHub issue.
  2. Email security@grcengineering.com with:
    • Description of the vulnerability
    • Steps to reproduce
    • Potential impact assessment
    • Any suggested fix (optional)
  3. You will receive an acknowledgment within 48 hours.
  4. We aim to provide a fix within 7 days for critical vulnerabilities.

Supply Chain Compromise Response

If you suspect a supply chain compromise affecting CVM (e.g., malicious dependency, compromised CI/CD, tampered release artifact):

  1. Immediately notify security@grcengineering.com with subject line: [SUPPLY CHAIN] CVM compromise suspected
  2. Include: affected version(s), indicator of compromise, how you discovered it
  3. We will initiate our incident response playbook:
    • Triage and identify affected components (first 30 minutes)
    • Pin to known-good dependency versions and disable affected workflows (first 2 hours)
    • Rotate all potentially exposed credentials — revoke old BEFORE issuing new (first 4 hours)
    • Check all distribution channels: container registries, release artifacts, documentation
    • Publish advisory and patched release

Verification

All CVM release artifacts include:

  • SLSA build provenance attestations (verify with gh attestation verify)
  • Cosign signatures on container images (verify with cosign verify)
  • SBOM in CycloneDX format (generated by cargo-cyclonedx)
  • Cargo.lock committed for reproducible builds

About

Credential Vending Machine — an STS broker that vends short-lived, scoped API credentials for platforms lacking native OIDC federation

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors