Currently supported versions:
- Version 0.x.x (current development version)
Security updates are applied to the latest version.
The GitLab CI Lint team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings.
If you discover a security vulnerability, please do NOT open a public issue.
Private vulnerability disclosure:
- Send an email to the project maintainer
- Use the subject prefix:
[Security] - Include detailed information about the vulnerability
- Provide steps to reproduce if applicable
- Include your suggested fix (if you have one)
What to Include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any relevant logs or screenshots
- Version of gitlab-ci-lint affected
- We will send a confirmation email within 48 hours
- We will investigate the vulnerability
- We will determine the severity and impact
- We will develop a fix
- We will release a security update
- We will announce the security fix (crediting you if you wish)
We aim to respond to security reports within 48 hours and provide regular updates on our progress.
We will coordinate disclosure of security vulnerabilities:
- We will not disclose vulnerabilities publicly before a fix is released
- We will provide credit to reporters (unless you wish to remain anonymous)
- We will include details in security advisories after fixes are deployed
-
Token Security
- Never commit GitLab tokens to version control
- Use environment variables or config files with proper permissions (0600)
- Rotate tokens regularly
- Use tokens with minimum required scopes (
apifor this tool)
-
Configuration File Permissions
# Ensure config file is readable only by you chmod 600 ~/.tools-config/.gitlab-ci-lint/config.yaml
-
Network Security
- Use HTTPS for GitLab instances
- Validate SSL certificates (tool does this by default)
- Be cautious with self-signed certificates
-
Updates
- Keep gitlab-ci-lint updated to the latest version
- Review changelogs for security updates
-
Dependency Management
- Regularly update Go dependencies
- Review security advisories for dependencies
- Use
go mod tidyto clean up dependencies
-
Code Review
- All code changes go through pull requests
- At least one approval required
- Automated security scanning in CI/CD
-
Secrets Management
- Never log tokens or credentials
- Use secure credential storage
- Sanitize error messages (remove sensitive data)
- Token Validation: Validates GitLab tokens before use
- URL Sanitization: Normalizes GitLab instance URLs
- Secure Defaults: Safe by default configuration
- No Credential Logging: Tokens are never logged
- Permission Checks: Validates file permissions
This project has not yet undergone a formal security audit.
We welcome security researchers to review our code and report vulnerabilities responsibly.
For security-related questions or concerns:
- Open a GitHub issue with the
[Security]tag (non-sensitive matters only) - Email the project maintainers for sensitive matters
We appreciate your help in keeping gitlab-ci-lint and our users safe!