We actively support the following versions of Kind Cluster Setup:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability in Kind Cluster Setup, please report it to us privately.
- Email: Send details to security@kind-cluster-setup.dev
- GitHub: Use the private vulnerability reporting feature
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Assessment: Initial assessment within 5 business days
- Updates: Regular updates on our progress
- Resolution: We aim to resolve critical issues within 30 days
When using Kind Cluster Setup:
- Environment Variables: Never commit sensitive data to version control
- Network Security: Restrict access to the API server in production
- CORS Configuration: Configure CORS properly for production deployments
- Authentication: Implement proper authentication for production use
- Updates: Keep dependencies and the application updated
- Monitoring: Monitor for unusual activity in your clusters
We follow responsible disclosure practices:
- We'll work with you to understand and resolve the issue
- We'll credit you for the discovery (unless you prefer to remain anonymous)
- We'll coordinate the timing of any public disclosure
- We'll provide security advisories for significant vulnerabilities
Kind Cluster Setup includes several security features:
- Input Validation: All API inputs are validated
- Resource Limits: Configurable resource limits for clusters
- Namespace Isolation: Applications are deployed in separate namespaces
- Template Validation: Application templates are validated before deployment
- Audit Logging: Comprehensive logging of all operations
- Local Development: This tool is designed for local development and testing
- Production Use: Additional security measures are required for production deployments
- Cluster Access: The tool requires cluster-admin privileges to manage Kind clusters
- Docker Access: Requires Docker daemon access to create Kind clusters
Thank you for helping keep Kind Cluster Setup secure!