Report security vulnerabilities privately via GitHub Security Advisories: https://github.com/rvben/shuck/security/advisories/new
Do not open public issues for security reports. Expect an initial response within 72 hours.
Only the latest 0.x release receives security fixes. Pre-1.0 releases do not guarantee backwards compatibility across patch versions.
In scope:
shuckdaemon and CLI (crates/shuck,crates/shuck-api,crates/shuck-core)- Guest agent protocol and host-guest channel (
crates/shuck-agent,crates/shuck-agent-proto) - Host networking and port-forward path (
crates/shuck-net, Linux) - Default image build pipeline (
.github/workflows/build-images.yml,guest/)
Out of scope:
- Guest kernel or rootfs CVEs (report upstream to Alpine / the kernel project).
- Firecracker vulnerabilities (report to firecracker-microvm).
- Apple Virtualization.framework vulnerabilities (report to Apple).
- Threat model — STRIDE analysis and residual risk.
- Hardening guide — recommended deployment posture.