Skip to content

Security: sbdevman/Thunderbolt

SECURITY.md

Security Policy

Supported Versions

Version Supported
0.1.x ✅ Current release

Reporting a Vulnerability

If you discover a security vulnerability in Thunderbolt, please report it responsibly.

⚠️ Do NOT open a public GitHub issue for security vulnerabilities.

How to Report

  1. Email: Send a detailed report to saeid.babaei@outlook.com
  2. GitHub Security Advisories: Use GitHub's private vulnerability reporting

What to Include

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Suggested fix (if any)

Response Timeline

  • Acknowledgement: Within 48 hours
  • Initial Assessment: Within 1 week
  • Fix & Disclosure: Coordinated with the reporter

Scope

The following are in scope for security reports:

  • Authentication / authorization bypass
  • Remote code execution
  • Injection vulnerabilities (SQL, command, etc.)
  • Sensitive data exposure (credentials, tokens)
  • Denial of service in the cluster engine
  • Plugin system sandbox escapes

Out of Scope

  • Vulnerabilities in third-party dependencies (report to the upstream project)
  • Issues that require physical access to the server
  • Social engineering attacks

Security Best Practices

When deploying Thunderbolt in production:

  • Never commit API keys or secrets — use environment variables or a secret manager
  • Enable JWT authentication (development mode disables auth)
  • Use TLS for all inter-node and client communication
  • Restrict Akka.NET cluster ports (8558) to internal networks only
  • Configure network policies in Kubernetes to isolate the cluster
  • Rotate InfluxDB tokens and PostgreSQL passwords regularly
  • Review CORS settings — restrict AllowedOrigins to your dashboard domain

There aren't any published security advisories