The MITRE SAF team takes security seriously. If you discover a security vulnerability in CIS Benchmark CLI, please report it responsibly.
- Email: saf-security@mitre.org
- GitHub: Use the Security tab to report vulnerabilities privately
When reporting security issues, please provide:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if you have one)
- Version affected (check with
cis-bench --version)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Fix Timeline: Varies by severity
- Keep Updated: Use the latest version from PyPI (
pip install --upgrade cis-bench) - Secure Credentials: Never commit browser cookies or authentication tokens
- Use HTTPS: Always access CIS WorkBench over HTTPS
- Review Exports: Validate XCCDF exports before deploying to production
- Dependency Scanning: Run
uv run banditbefore submitting PRs - Credential Handling: Never log or expose CIS WorkBench session cookies
- Input Validation: Sanitize all user inputs and URL parameters
- Test Security: Include security tests for new features
| Version | Supported |
|---|---|
| 0.1.x+ | ✅ Yes |
The project includes comprehensive security testing:
# Run security scan
uv run bandit -c pyproject.toml -r src/cis_bench/
# Check for vulnerable dependencies
uv pip list --outdated
# Run full test suite
uv run pytest tests/- CIS Benchmark CLI extracts browser cookies for CIS WorkBench authentication
- Cookies are stored locally in
~/.cis-bench/cookies.json - Ensure this file has appropriate permissions (600)
- Never commit this file to version control
- Browser opening features validate CIS WorkBench URLs
- Only
https://workbench.cisecurity.orgis allowed - Full executable paths used for subprocess calls
- XCCDF export uses lxml for XML generation
- Only processes data the tool itself generated
- No external/untrusted XML parsing
- Browser launching uses validated URLs and full executable paths
- No shell=True on Windows (uses webbrowser module)
- All subprocess calls use hardcoded or validated inputs