| Version | Supported |
|---|---|
0.x |
✅ — pre-1.0, security fixes ship in the next minor |
| older | ❌ |
Do not open a public GitHub issue for security reports.
Please report privately via GitHub Security Advisories.
Include:
- Affected version(s) (
stackit-nuke --version) - Reproduction steps or proof-of-concept
- Impact assessment (data loss, privilege escalation, info disclosure, …)
- Acknowledgement within 3 business days.
- Triage + initial assessment within 7 business days.
- A fix or mitigation plan within 30 days for confirmed high-severity issues.
Because stackit-nuke deletes infrastructure, we are particularly interested in:
- Auth/credential mishandling (leakage in logs, world-readable temp files, etc.)
- Config-allow-list bypasses (anything that lets the tool delete resources outside the configured
project-ids) - Dependency vulnerabilities in our supply chain
Out of scope:
- Issues in upstream STACKIT services
- Vulnerabilities in
libnukeitself — please report those at https://github.com/ekristen/libnuke/security
Every PR + push to main runs Trivy against:
- the working tree (filesystem + Go module deps)
- IaC + GitHub workflow configs
- the published container image (post-release, on tag)
Findings show up under the repo's Security → Code scanning tab. PRs fail on CRITICAL filesystem findings; lower severities are reported but non-blocking. Accepted findings are tracked in .trivyignore with an expiry and rationale.
Binaries and container images are signed with Cosign keyless via GitHub OIDC. Verify before running — see docs/releases.md.