KubeElasti values the contributions of individuals who help improve its security by reporting vulnerabilities. Each submission is promptly assessed by a trusted group of community maintainers committed to safeguarding the project.
| Version | Supported | Notes |
|---|---|---|
| Latest | ✅ | Latest stable release line |
| < Latest | ❌ | End‑of‑life |
We generally provide security fixes for the latest minor release lines.
The following components are in‑scope for security reporting:
elasti-controllerelasti-resolver- Helm charts and Kubernetes manifests distributed in the official repository
- All container images published under
ghcr.io/truefoundry/elasti*
Out‑of‑scope issues include but are not limited to:
- Third‑party dependencies (report upstream instead)
- Vulnerabilities requiring root or cluster‑admin access
- Best‑practice hardening suggestions without a concrete security impact
-
Email a detailed report to our private list: security@truefoundry.com.
-
Include:
- A descriptive title (e.g., "Denial‑of‑Service via oversized HTTP header").
- Affected versions and environment details.
- Reproduction steps or proof‑of‑concept (PoC) code.
- Expected vs. actual behavior.
- Impact assessment (confidentiality, integrity, availability).
- Optional patch or mitigation ideas.
-
Do NOT open a public GitHub issue for security problems.
- We follow coordinated disclosure.
- We publish a GitHub Security Advisory and release notes once a patch is available.
- We credit reporters unless anonymity is requested.
- If a vulnerability is found to be already public, we will fast‑track patching and disclosure.
We currently do not offer a monetary bug bounty, but we are happy to provide swag and public recognition.
Your efforts make the KubeElasti ecosystem safer for everyone. Thank you for helping us protect our users!