| Version | Supported |
|---|---|
main (development) |
Yes |
| Latest release tag | Yes |
| Older releases | No |
We take security seriously. If you discover a vulnerability, please report it responsibly through one of these channels:
Use GitHub's built-in private reporting to create a confidential advisory visible only to maintainers:
Send details to [email protected]. If possible, include:
- Description of the vulnerability
- Steps to reproduce
- Affected components (backend API, auth, storage, specific format handler, etc.)
- Potential impact assessment
- Suggested fix or patch, if available
- Acknowledgment within 72 hours of your report
- Initial assessment within 1 week
- Fix timeline depends on severity — critical issues are prioritized immediately
We will coordinate disclosure with you and credit reporters in the release notes (unless you prefer to remain anonymous).
- Backend API server (
artifact-keeper/) - Authentication and authorization (JWT, API keys, OIDC, LDAP, SAML)
- Package format handlers (upload, download, proxy)
- Storage backends (filesystem, S3)
- gRPC services
- Web frontend (
artifact-keeper-web/) - Docker images published to
ghcr.io
- Demo instance at
demo.artifactkeeper.com(report issues, but no bounties) - Example WASM plugin template (
artifact-keeper-example-plugin/) - Third-party dependencies (report upstream, but let us know if it affects us)
- Always run behind a reverse proxy with TLS
- Use strong, unique values for
JWT_SECRETandCREDENTIAL_ENCRYPTION_KEY - Enable rate limiting in production
- Regularly rotate API keys and signing keys
- Keep your instance updated to the latest release