If you discover a security vulnerability in DX.Logger, please report it by emailing olaf@monien.net.
Please do not open a public issue for security vulnerabilities.
This project uses configuration files to manage sensitive data like API keys and server URLs. Follow these guidelines:
-
Never commit sensitive data
- Use
config.local.inifor your credentials (already in.gitignore) - Only commit
config.example.iniwith placeholder values
- Use
-
Use environment-specific configurations
- Development:
config.local.ini - Production: Environment variables or secure vaults
- CI/CD: GitHub Secrets or similar
- Development:
-
Rotate credentials regularly
- Change API keys periodically
- Revoke unused or compromised keys immediately
-
Limit access
- Only share credentials with authorized team members
- Use separate credentials for different environments
- ❌ Never hardcode API keys in source code
- ❌ Never commit
*.local.inifiles - ❌ Never share credentials in chat, email, or documentation
- ❌ Never use production credentials in development/testing
- ❌ Never commit credentials in comments or commit messages
The following patterns are automatically ignored:
config.local.ini
*.local.ini
.env.local
This repository benefits from:
- Secret Scanning: GitHub automatically scans for known secret patterns
- Push Protection: Prevents accidental commits of secrets (when enabled)
- Dependabot: Monitors dependencies for security vulnerabilities
Before committing:
- ✅ Check that no sensitive data is in your changes
- ✅ Verify
config.local.iniis not staged - ✅ Use placeholder values in examples
- ✅ Review the diff before pushing
| Version | Supported |
|---|---|
| Latest | ✅ Yes |
| Older | ❌ No |
We only provide security updates for the latest version.
- docs/CONFIGURATION.md - Detailed configuration guide
- docs/SEQ_PROVIDER.md - Seq provider documentation
- GitHub Security Best Practices
- OWASP Secrets Management Cheat Sheet
This security policy is part of the DX.Logger project and is covered by the MIT License.