As this project is in early development (v0.x), only the latest release is officially supported with security updates.
| Version | Supported |
|---|---|
| v0.1.x | ✔ |
| < 0.1.0 | ✖ |
workflow takes its security seriously. If you believe you have found a security vulnerability, please report it as described below.
Please do not report security vulnerabilities through public GitHub issues.
Please email dev.dilute902@passinbox.com with the subject line [SECURITY] workflow vulnerability.
In your email, please include:
- The specific version of
wfyou are using. - A description of the vulnerability.
- Steps to reproduce the issue (e.g., a malicious TOML file or specific command sequence).
- You will receive an acknowledgement of receipt of your report within 48 hours.
- The issue will be investigated and its impact determined.
- If confirmed, a patch will be released as quickly as possible.
- Once the patch is released, your contribution will be publicly acknowledged (unless you prefer to remain anonymous).
workflow is a local execution tool. Specific interests are placed in:
- Arbitrary Code Execution: Situations where
wfexecutes code not defined in the intended workflow. - Privilege Escalation: If
wfcan be tricked into running commands with higher privileges than the user intended. - Data Leakage: If
wflogs sensitive environment variables despite configuration to suppress them.
Thank you for helping keep workflow safe!