We actively maintain and provide security updates for the following versions:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
We recommend always using the latest version to ensure you have the most recent security fixes.
We take security vulnerabilities seriously. If you discover a security vulnerability in NetBird API Exporter, please report it to us privately.
- Email: Send details to [maintainer email - please update this]
- Subject Line: Use "SECURITY: [brief description]"
- Include:
- Description of the vulnerability
- Steps to reproduce (if applicable)
- Affected versions
- Potential impact assessment
- Any suggested fixes (optional)
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Initial Assessment: We'll provide an initial assessment within 5 business days
- Updates: We'll keep you informed of our progress
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Credit: We'll credit you in the fix announcement (unless you prefer to remain anonymous)
Please allow us reasonable time to investigate and fix vulnerabilities before public disclosure. We commit to:
- Working with you to understand and resolve the issue
- Keeping you informed of our progress
- Providing credit for responsible disclosure
- Releasing security updates in a timely manner
- Never log API tokens: Ensure
NETBIRD_API_TOKENis not logged or exposed - Rotate tokens regularly: Use token rotation best practices
- Limit token scope: Use minimal required permissions for the API token
- Secure storage: Store tokens in secure credential management systems
- Use HTTPS: Always use HTTPS for NetBird API connections
- Network isolation: Deploy the exporter in appropriate network segments
- Firewall rules: Restrict access to the metrics endpoint (
/metrics) - Reverse proxy: Consider using a reverse proxy with authentication
- Run as non-root: The provided Docker image runs as
nobodyuser - Image scanning: Regularly scan container images for vulnerabilities
- Resource limits: Set appropriate CPU and memory limits
- Security contexts: Use appropriate Kubernetes security contexts
- Environment variables: Use secrets management for sensitive configuration
- File permissions: Secure configuration files with appropriate permissions
- Monitoring: Monitor exporter logs for suspicious activity
- Input validation: Validate all external inputs
- Error handling: Avoid exposing sensitive information in errors
- Dependencies: Keep dependencies updated and scan for vulnerabilities
- Secrets: Never commit secrets or API tokens to version control
- Reproducible builds: Use pinned dependencies and container base images
- Supply chain: Verify integrity of dependencies
- Artifact attestations: All releases include signed build provenance attestations
- Signing: Container images and binaries are signed using Sigstore
- Structured Logging: Sensitive data is filtered from logs
- Error Handling: Errors don't expose system internals
- Minimal Privileges: Container runs as non-root user
- Input Validation: API responses are validated before processing
- Rate Limiting: Built-in protection against API abuse
- Build Provenance: All artifacts include signed attestations for supply chain security
- Default Configurations: Secure defaults are provided
- TLS Support: HTTPS connections to NetBird API
- Metrics Filtering: Only necessary metrics are exposed
- Health Checks: Built-in health endpoints for monitoring
All releases include signed build provenance attestations that can be verified using the GitHub CLI:
# Install GitHub CLI if not already installed
# See: https://cli.github.com/
# Verify Docker image attestation
gh attestation verify oci://ghcr.io/netbird-io/netbird-api-exporter:latest --owner netbird-io
# Download and verify binary attestations
gh run download --repo netbird-io/netbird-api-exporter --name netbird-api-exporter-binaries-[VERSION]
gh attestation verify netbird-api-exporter-linux-amd64 --owner netbird-io- Build environment: Verification that artifacts were built in GitHub Actions
- Source integrity: Confirmation of the exact source code used
- Supply chain security: Protection against tampered or malicious artifacts
- Audit trail: Complete provenance information for compliance
- Docker images published to
ghcr.io - Go binaries for multiple platforms (Linux, macOS, Windows)
- Container image signatures and SBOMs (Software Bill of Materials)
- GitHub Releases: Security updates are clearly marked in release notes
- Changelog: Security fixes are documented in
CHANGELOG.md - Container Images: Updated images are published to container registries
For critical security vulnerabilities:
- Emergency releases will be published within 24-48 hours
- Clear upgrade instructions will be provided
- Mitigation steps will be documented
- We follow OWASP security guidelines
- Regular security reviews of code and dependencies
- Automated security scanning in CI/CD pipeline
- The exporter only collects metrics data from NetBird API
- No personal data is stored or transmitted beyond what's necessary for metrics
- Logs are structured to avoid capturing sensitive information
For security-related questions or concerns:
- Security Issues: [maintainer email - please update this]
- General Questions: Open an issue on GitHub (for non-security matters)
We appreciate the security research community and responsible disclosure of vulnerabilities. Contributors who report security issues will be acknowledged in our security advisories (unless they prefer to remain anonymous).
Note: This security policy is subject to updates. Please check back regularly for the latest version.