Thank you for helping make Kaniko more secure. We appreciate your efforts and are committed to working with you to resolve any potential issues in a timely manner.
If you discover a security vulnerability, please send an email to security@kaniko-project.org. All security vulnerabilities will be promptly addressed.
Please include the following information in your vulnerability report:
- A description of the vulnerability and its potential impact
- Steps to reproduce the vulnerability
- Proof-of-concept or exploit code (if available)
- Your preferred contact information (if you wish to remain anonymous)
We use multiple security scanning tools to maintain the security of our codebase:
- Purpose: Scans for vulnerabilities in dependencies and filesystem
- Configuration:
trivy.yaml - Frequency: On every push, pull request, and weekly schedule
- Output: SARIF format uploaded to GitHub Security tab
- Tool: golangci-lint
- Configuration:
.golangci.yml - Focus: Security-focused linters, code quality, and best practices
- Frequency: On every push and pull request
- Tools: Go modules, go-licenses
- Checks:
- Dependency vulnerability scanning
- License compliance verification
- SBOM generation
- Frequency: On every push and pull request
- Tool: Trivy with secret scanning enabled
- Focus: Detects hardcoded secrets, API keys, and sensitive information
- Frequency: On every push and pull request
- Tool: GitHub CodeQL
- Focus: Static Application Security Testing (SAST)
- Languages: Go
- Frequency: Weekly scheduled scans
-
Follow Secure Coding Guidelines
- Use parameterized queries to prevent injection attacks
- Validate all user inputs
- Implement proper error handling without exposing sensitive information
-
Dependency Management
- Keep dependencies up to date
- Regularly review and update third-party packages
- Use Go modules for dependency management
-
Secret Management
- Never commit secrets to version control
- Use environment variables or secure secret management systems
- Regularly scan for hardcoded secrets
-
Container Security
- Use minimal base images
- Run containers as non-root users when possible
- Implement proper file permissions
-
Regular Security Audits
- Conduct periodic security reviews
- Monitor vulnerability databases for related issues
- Keep security tools and configurations up to date
-
Incident Response
- Establish clear incident response procedures
- Maintain communication channels for security issues
- Document security incidents and resolutions
-
Security Testing
- Integrate security testing into CI/CD pipeline
- Perform penetration testing on major releases
- Validate security controls regularly
- Initial Response: Within 24 hours of report
- Initial Assessment: Within 48 hours
- Fix Development: Within 7 days for critical issues
- Release: Within 14 days for critical issues
- Critical: Remote code execution, privilege escalation
- High: Data exposure, authentication bypass
- Medium: Information disclosure, denial of service
- Low: Minor security issues, information leakage
- Trivy - Vulnerability scanner
- golangci-lint - Go linter
- CodeQL - Static analysis
- OWASP Dependency Check - Dependency vulnerability scanning
For security-related questions or concerns:
- Email: security@kaniko-project.org
- Security Policy: SECURITY.md
- Vulnerability Disclosure: See above
We thank the security research community for their contributions to making Kaniko more secure. Special thanks to those who responsibly disclose vulnerabilities following our security policy.