karpenter-optimizer

Security Policy

Supported Versions

We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:

Version Supported
1.x.x :white_check_mark:
< 1.0 :x:

Reporting a Vulnerability

We take the security of Karpenter Optimizer seriously. If you believe you have found a security vulnerability, please report it to us as described below.

Please do NOT:

Please DO:

  1. Email us directly at security@kaskol10.github.io or open a private security advisory with:
    • Description of the vulnerability
    • Steps to reproduce
    • Potential impact
    • Suggested fix (if you have one)
  2. Include the following information:
    • Affected component(s)
    • Attack vector
    • Privileges required
    • User interaction required
    • CVSS score (if you can calculate it)
  3. Allow us 90 days to address the vulnerability before public disclosure

What to Expect

Security Best Practices

When using Karpenter Optimizer:

  1. RBAC: Use least-privilege RBAC policies
  2. Network Policies: Restrict network access where possible
  3. Secrets: Never commit secrets to version control
  4. Updates: Keep Karpenter Optimizer updated to the latest version
  5. Monitoring: Monitor for suspicious activity
  6. Audit Logs: Enable Kubernetes audit logging

Known Security Considerations

Security Updates

Security updates will be:

Security Audit

We recommend:

Responsible Disclosure Timeline

Contact

For security-related issues, please contact:

Thank you for helping keep Karpenter Optimizer and its users safe!