| Version | Supported |
|---|---|
| 0.8.x | ✅ |
| < 0.8 | ❌ |
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of these methods:
- Email: lance@lance0.com
- GitHub: Use private vulnerability reporting
- Type of vulnerability (e.g., authentication bypass, injection, DoS)
- Full paths of source files related to the vulnerability
- Step-by-step instructions to reproduce
- Proof-of-concept or exploit code (if possible)
- Impact assessment
- Initial response: Within 48 hours
- Status update: Within 7 days
- Fix timeline: Depends on severity, typically 30-90 days
We consider security research conducted in accordance with this policy to be:
- Authorized and not subject to legal action
- Conducted in good faith
- Helpful to the security of the project
When deploying prefixd:
- Use strong API tokens - Generate with
openssl rand -hex 32 - Enable TLS - Never expose HTTP API without encryption
- Network isolation - Place prefixd on a management network
- Least privilege - Use operator roles appropriately (admin/operator/viewer)
- Safelist infrastructure - Add router loopbacks and critical IPs to safelist
- Monitor audit logs - Review
/var/log/prefixd/audit.jsonlregularly - Keep updated - Watch for security advisories
FlowSpec rules can drop traffic. Guardrails are in place to prevent:
- Overly broad prefixes (only /32 IPv4, /128 IPv6 allowed)
- Infrastructure disruption (safelist protection)
- Runaway rules (quotas, mandatory TTL)
| Mode | Security Level | Use Case |
|---|---|---|
none |
Development only | |
bearer |
✅ Secure | Production API/CLI |
mtls |
✅ Most Secure | Zero-trust environments |
We use cargo audit in CI to check for known vulnerabilities. Current advisories are documented in the CI workflow with justification for any ignores.