Do not open public issues for suspected vulnerabilities.
Report vulnerabilities privately through your Git hosting provider's private security reporting channel (or a private maintainer contact) and include:
- A clear description of the issue and impact.
- Reproduction steps or a minimal proof of concept.
- Affected versions/commit hashes.
- Suggested mitigation, if known.
Security-sensitive components include:
- Web server/auth/webhook endpoints under
src/solux/serve/. - Workflow validation/execution under
src/solux/workflows/. - External module loading under
src/solux/modules/. - Queue/worker state handling under
src/solux/db.pyandsrc/solux/worker.py.
- Keep
security.mode = "untrusted"for untrusted workflows or runtime inputs. - Require webhook signatures (
security.webhook_secret) for internet-exposed webhook endpoints. - Require OIDC auth when binding the web server to non-local interfaces.