www-project-docksec

Security Policy

Supported Versions

We release patches for security vulnerabilities in the following versions:

Version Supported
0.0.19 :white_check_mark:
0.0.18 :white_check_mark:
< 0.0.18 :x:

Reporting a Vulnerability

We take the security of DockSec seriously. If you believe you have found a security vulnerability, please report it to us as described below.

Where to Report

Please do NOT report security vulnerabilities through public GitHub issues.

Instead, please report them via one of the following methods:

  1. Email: Send an email to [email protected] with the subject line “SECURITY: [Brief Description]”
  2. GitHub Security Advisory: Use GitHub’s private vulnerability reporting feature at https://github.com/advaitpatel/DockSec/security/advisories/new

What to Include

Please include the following information in your report:

Response Timeline

We will make every effort to respond to your report according to the following timeline:

Disclosure Policy

Security Best Practices for Users

API Key Security

DockSec uses OpenAI API keys for AI-powered analysis. To keep your keys secure:

  1. Never commit API keys to version control
    # Use environment variables
    export OPENAI_API_KEY="your-key-here"
       
    # Or use a .env file (ensure it's in .gitignore)
    echo "OPENAI_API_KEY=your-key-here" > .env
    
  2. Restrict API key permissions in your OpenAI dashboard
  3. Rotate keys regularly, especially if they may have been exposed
  4. Monitor API usage for unexpected activity

Docker Image Scanning

When scanning Docker images:

  1. Scan images from trusted sources only
  2. Be cautious when scanning images that may contain sensitive data
  3. Review generated reports before sharing them (they may contain sensitive information)
  4. Use scan-only mode in environments where AI/API access is restricted

CI/CD Integration

When using DockSec in CI/CD pipelines:

  1. Store API keys in CI/CD secrets, not in code or logs
  2. Limit access to CI/CD jobs that use DockSec
  3. Review logs to ensure sensitive information isn’t exposed
  4. Use read-only tokens where possible

Network Security

DockSec makes network calls to:

Ensure your network security policies allow these connections if needed.

Known Security Considerations

1. AI Model Limitations

2. External Tool Dependencies

DockSec relies on external tools:

Keep these tools updated to ensure you have the latest security checks.

3. Data Privacy

4. Report Security

Generated reports may contain:

Treat reports as sensitive data and store them securely.

Security Features in DockSec

Input Validation

Rate Limiting

Error Handling

Vulnerability Disclosure History

No security vulnerabilities have been reported or disclosed for DockSec as of January 2026.

This section will be updated as needed.

Security Testing

We encourage security researchers to test DockSec for vulnerabilities. Our testing recommendations:

In Scope

Out of Scope

Recognition

We believe in recognizing security researchers who help make DockSec more secure:

Questions?

If you have questions about this security policy or DockSec’s security in general, please:

  1. Review our documentation
  2. Check existing GitHub issues
  3. Contact us at [email protected]

Note: This security policy may be updated from time to time. Please check back regularly for the latest version.

Last updated: January 9, 2026