| Version | Supported |
|---|---|
| 0.1.x | ✅ Yes |
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability, please disclose it responsibly by emailing:
Include as much detail as possible:
- A description of the vulnerability and its potential impact
- Steps to reproduce or a proof-of-concept
- The affected version(s)
- Any suggested mitigations (if known)
You will receive a response within 72 hours acknowledging your report. We will work with you to understand and resolve the issue and will keep you informed of the progress.
- Never commit config files containing plaintext secrets to version control.
- Use environment variable expansion for all sensitive values:
auth: type: username_password username: myuser password: "${MQTT_PASSWORD}"
- Add
mer.yamland any*.yamlfiles containing secrets to your.gitignore.
- For production MQTT brokers, always use
mqtts://(TLS) instead ofmqtt://. - For HTTP endpoints, always use
https://in production.
- Store secrets in environment variables or a secrets manager (e.g., HashiCorp Vault, AWS Secrets Manager).
- Avoid logging environment variable values.
- When using Docker, pass secrets via environment variables (
-eflag or--env-file), not baked into the image. - Never build Docker images with secrets in the
ARGorENVlayers.
We use cargo audit in CI to detect known vulnerabilities in dependencies. To run it locally:
cargo install cargo-audit
cargo audit