If you discover a security vulnerability in this project, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please report security issues to: security@avalabs.org
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Resolution: Depends on severity, typically 30-90 days
This security policy applies to:
- The
avalanche-deployrepository - Terraform modules in
terraform/ - Ansible roles in
ansible/roles/ - Go tools in
tools/
When using this project:
- Never commit secrets - Use environment variables or secret managers
- Restrict SSH access - Limit
operator_ipinterraform/<provider>/terraform.tfvars - Use private keys securely - Store in secure locations, never commit
- Keep dependencies updated - Run
go mod tidyand update terraform providers - Review
configs/l1/genesis/genesis.json- Ensure pre-funded addresses are intended
- Default Grafana credentials are
admin/admin- change immediately - SSH is allowed from your IP by default - restrict in production
- P-Chain private keys should be stored in hardware wallets for mainnet
We appreciate security researchers who help keep Avalanche Deploy secure.