Current support status of each version.
| Version | Supported |
|---|---|
| 3.4.x | ✅ |
| < 3.4.1 | ❌ |
Webhook includes several security features to help prevent command injection attacks:
-
Command Path Whitelist: Use
--allowed-command-paths(orALLOWED_COMMAND_PATHSenvironment variable) to restrict which commands can be executed. Only commands from the whitelist will be allowed to run. -
Argument Validation:
--max-arg-length: Limit the maximum length of a single argument (default: 1MB)--max-total-args-length: Limit the total length of all arguments (default: 10MB)--max-args-count: Limit the maximum number of arguments (default: 1000)
-
Strict Mode: Enable
--strict-modeto reject arguments containing potentially dangerous characters (shell special characters like;,|,&,`,$, etc.) -
Secure Logging: All command executions are logged with sensitive information (passwords, tokens, keys) automatically sanitized.
Best Practices:
- Always use command path whitelist in production environments
- Enable strict mode for enhanced security
- Set appropriate limits for argument length and count
- Regularly review and update your whitelist
- Never enable
--allow-auto-chmodin production (it's a security risk)
For more details, see the Configuration Parameters documentation or Webhook Parameters.
For a complete guide on securing your Webhook deployment, including network security, authentication, configuration security, and deployment best practices, see:
- Security Best Practices (English) - Comprehensive security guide
- 安全最佳实践 (中文) - 全面的安全指南
If you discover a security vulnerability, please report it responsibly:
- Do not open a public issue
- Report security concerns through one of the following methods:
- Open a Security Advisory on GitHub
- Contact the maintainers through GitHub (if available)
- Provide detailed information about the vulnerability, including:
- Description of the vulnerability
- Steps to reproduce (if applicable)
- Potential impact
- Suggested fix (if you have one)
- Allow time for the issue to be addressed before public disclosure
For more comprehensive security guidance, see the Security Best Practices documentation.