Quay is pre-1.0. Only the main branch receives security fixes; there are no stable release branches yet.
Please do not file public GitHub issues for security vulnerabilities.
Use GitHub Security Advisories to report privately. I'll usually reply within a few days. If you haven't heard back in a week, ping me via GitHub Discussions.
In scope — vulnerabilities in Quay's own code:
AskpassServerUnix domain socket IPC (secret delivery to SSH_ASKPASS helper)KeychainStore/ReferenceResolver— Keychain credential read/write (login-script step lock action writes; SSH credentials remain user-managed)SSHCommandBuilder— SSH argv assembly that could expose secrets via process listingSettingsBundleexport/import — AES-GCM-256 + PBKDF2 encryptionSecretReferenceURI parsing — schemes that could allow unintended data exposureQuayAskpasshelper binary — the bundled SSH_ASKPASS CLI
The threat model is documented in docs/secrets-architecture.md.
Out of scope — please report upstream:
- Vulnerabilities in OpenSSH (
/usr/bin/ssh) → openssh.com - Vulnerabilities in Ghostty / libghostty → ghostty.org
- Vulnerabilities in macOS Keychain Services → Apple Product Security