Currently supported versions of EVM-Indexer:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Security updates will be released as patch versions. We strongly recommend keeping your installation up to date with the latest patch version.
If you discover a security vulnerability in EVM-Indexer, please follow these steps:
- DO NOT disclose the vulnerability publicly.
- Open a private security advisory.
- Describe the vulnerability
- Include steps to reproduce
- If possible, include a fix or suggestions for fixing
- You will receive a response within 48 hours.
- Once the vulnerability is confirmed:
- A fix will be developed
- A new version will be released
- The vulnerability will be publicly disclosed after users have had time to update
When deploying EVM-Indexer:
-
Environment Variables
- Never commit sensitive environment variables
- Use secure secrets management
- Rotate credentials regularly
-
Network Security
- Run behind a reverse proxy
- Use TLS/SSL for all connections
- Limit access to metrics endpoints
-
MongoDB Security
- Use authentication
- Enable access control
- Regular security updates
- Proper network isolation
-
RPC Endpoints
- Use secure WebSocket connections (WSS)
- Use HTTPS for HTTP endpoints
- Implement rate limiting
- Monitor for abuse
-
Docker Security
- Use official images only
- Keep images updated
- Implement resource limits
- Use non-root users
Example of secure configuration:
[general]
metrics_laddr = "127.0.0.1" # Local access only
metrics_port = 9090
[database]
db_host = "mongodb"
db_port = 27017
db_name = "indexer"# Use environment variables for credentials
EVM_INDEXER_DATABASE_USERNAME=...
EVM_INDEXER_DATABASE_PASSWORD=...Before deploying to production:
- All environment variables are properly set
- MongoDB authentication is enabled
- Secure RPC endpoints are configured
- Metrics endpoint is properly secured
- Latest version is installed
- Logging is properly configured
- Monitoring is set up
- Backup strategy is in place
- Recovery procedures are documented
We regularly update dependencies to patch security vulnerabilities. Users should:
- Monitor security advisories
- Update promptly when security patches are released
- Regularly check for outdated dependencies
For security concerns, contact:
- Discord:
@mrzigha - GitHub Security Advisory Repository Security Tab