I welcome reports about:
- Proxy bypass — ways to make network connections from
RUNsteps that evade the Buildcage proxy (other than the known domain fronting limitation) - Network isolation escape — bypassing CNI isolation or iptables rules to reach the internet directly
- GitHub Actions setup — vulnerabilities in the
setuporreportactions (e.g., injection, credential leak) - DNS filtering bypass — bypassing the DNS redirect mechanism
The following are out of scope (please report to the respective projects instead):
- Vulnerabilities in BuildKit, Docker, or other upstream dependencies
- Issues that require the attacker to already have privileged access to the host
- Domain fronting via shared CDN infrastructure (documented in README's Security Considerations)
| Version | Supported |
|---|---|
| 1.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
Use GitHub Security Advisories to report vulnerabilities privately:
- Go to the Security tab of this repository
- Click Report a vulnerability
- Fill in the details and submit
- Description of the vulnerability and its impact
- Steps to reproduce
- Proof of concept, if possible
- Affected versions
This project is maintained by a single developer. Realistic timelines:
- Acknowledgment: within 1 week
- Validation: a few days to 2 weeks, depending on complexity
- Fix release: varies by severity and complexity; critical issues are prioritized
I'll credit reporters in the security advisory unless they prefer to remain anonymous.
All code is public and I welcome security reviews. If you prefer to audit or control the code yourself, feel free to fork and self-host.