Skip to content

Security: backube/snapscheduler

SECURITY.md

Security

Administrators are encouraged to consider the implications of providing access to the snapshotscheduler. It allows users to create a potentially very large number of volume snapshots.

The use of RBAC rules and ResourceQuota to control access is strongly encouraged.

Vulnerabilities

If you believe you have discovered a security vulnerability, please directly mail jstrunk@redhat.com, and do not open an Issue. If you would like to encrypt the mail, please use gpg key 0xBD1FF508. The fingerprint is:

74FC 7E7E FD0F F009 513C  C9E3 9360 133D BD1F F508

There aren’t any published security advisories