Murmur is pre-1.0. Only the main branch receives security fixes; no
back-porting. Once v1.0.0 ships, the latest two minor versions will be
supported.
Please do not open a public GitHub issue.
Email security@gallowaysoftware.ca with:
- A description of the issue and where it occurs (file paths or the reproduction).
- The Murmur revision/SHA you reproduced against.
- The impact you believe it has.
We aim to acknowledge within 3 business days and to ship a fix or coordinated disclosure plan within 14 days. If the fix is non-trivial we'll keep you in the loop on the timeline.
STABILITY.md tracks correctness and operational hazards that
are publicly known. The "Known sharp edges" list there enumerates issues that
are not strictly security vulnerabilities but can still cause data loss or
operational failure if an integrator isn't aware of them — most notably:
- Permissive CORS (
Access-Control-Allow-Origin: *) onpkg/admin. Do not expose the admin server to the public internet without first restricting origins. - The
replacedirective ingo.modpinningapache/spark-connect-goto a fork. If you importpkg/exec/batch/sparkconnect, audit the fork yourself before depending on it.
In scope: vulnerabilities in pkg/..., cmd/..., the embedded web UI under
web/, the Terraform module, and the docker-compose stack used by the test
suite. Out of scope: third-party dependencies (please report upstream); local
development convenience (e.g. dynamodb-local on a laptop).