This project maintains security updates for the following versions:
| Version | Supported |
|---|---|
| main | ✅ |
We take security vulnerabilities seriously. If you discover a security vulnerability in Nos Ilha, please report it responsibly:
- DO NOT open a public issue for security vulnerabilities
- Use GitHub's private vulnerability reporting to report security issues
- Include as much detail as possible about the vulnerability
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if you have one)
- 24 hours: Acknowledgment of your report
- 72 hours: Initial assessment and severity classification
- 7 days: Regular updates on investigation progress
- 30 days: Target resolution timeframe
- Trivy Scanning: Container and dependency vulnerability scanning
- Static Code Analysis: detekt (Kotlin), ESLint (TypeScript), tfsec (Terraform)
- Basic Dependency Review: Automated dependency vulnerability checking
- Build Security: Secure build processes and container image scanning
- CodeQL Analysis: Automated semantic code analysis for TypeScript and Kotlin
- Secret Scanning: Detection of accidentally committed secrets and credentials
- Advanced Dependency Features: Enhanced vulnerability analysis with more detailed reporting
- Security Advisories: Proactive security notifications and automated remediation
Note: Advanced Security is free for public repositories but requires a paid license for private repositories. This repository implements comprehensive security scanning through Trivy and static analysis tools, with CodeQL analysis available when Advanced Security is enabled.
- Branch Protection: Required reviews and status checks
- Signed Commits: Encouraged for all contributors
- Security Headers: Implemented in production deployment
- JWT Authentication: Secure API access control
- Least Privilege: Minimal IAM permissions for Cloud Run services and CI/CD
- Encrypted Secrets: All sensitive data stored in Google Secret Manager
- Network Security: HTTPS-only communication with automatic SSL/TLS certificates
- Container Security: Minimal attack surface with optimized base images
- Cloud Run Security: Services run in Google's secure container runtime environment
- Keep dependencies up to date
- Use secure coding practices
- Never commit secrets or credentials
- Test security features thoroughly
- Follow the principle of least privilege
- Use verified and scanned container images from Google Artifact Registry
- Enable all security features in production Cloud Run environment
- Regularly update base images and dependencies through automated workflows
- Monitor security alerts through GitHub Security tab and act promptly
- Implement comprehensive logging through Google Cloud Logging
- Use Google Secret Manager for all sensitive configuration
- Ensure minimal resource allocation and auto-scaling for cost and security optimization
For security-related questions or concerns:
- Security Issues: Use GitHub's private vulnerability reporting
- General Questions: Create an issue in the repository with the
securitylabel - CI/CD Security: Refer to the CI/CD Pipeline Documentation for deployment security details