Skip to content

Security: mikkovihonen/quadletman

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

This is a hobby project maintained by a single person. If you discover a security vulnerability in quadletman, you may report it, but there is no guarantee of it being fixed.

Do not open a public GitHub issue for security vulnerabilities.

Please use GitHub's private vulnerability reporting.

Include:

  • A description of the vulnerability
  • Steps to reproduce
  • The potential impact
  • Any suggested fix (optional)

Supported Versions

This is a side project maintained by a single developer. There are no official supported versions. See also LICENSE.

Security Model

quadletman runs as a dedicated quadletman system user (or root for legacy installations) and manages Podman containers via per-compartment Linux users. Admin operations escalate via the authenticated user's sudo credentials.

Key security controls:

  • PAM-based authentication restricted to sudo/wheel group members
  • Branded-type input validation at every layer boundary
  • Session credentials stored in the Linux kernel keyring (when available)
  • CSRF protection via double-submit cookie
  • CSP headers blocking all external resource loading
  • All host mutations routed through audited wrappers

There aren’t any published security advisories