We sincerely thank security researchers and users for helping to keep the Sealos project and its community safe. Your contributions to identifying and responsibly disclosing security vulnerabilities are invaluable to maintaining the security and integrity of our platform.
The following table shows which versions of Sealos are currently supported with security updates:
| Sealos Version | Version Range | Supported |
|---|---|---|
| 5.x | >= 5.0.0 | ✅ Yes |
| 4.x | >= 4.0.0, < 5.0.0 | |
| 3.x and older | < 4.0.0 | ❌ No |
We take security vulnerabilities seriously and appreciate your help in responsibly disclosing them. Please follow these steps to report a security vulnerability:
Please do NOT create a public GitHub Issue for security vulnerabilities. Instead, please report security vulnerabilities privately using one of the following methods:
- Email: Send a detailed report to [email protected]
- GitHub Security Advisory: Use GitHub's "Privately report a security vulnerability" feature on the repository's "Security" tab
When reporting a vulnerability, please include the following information:
- Clear description: A detailed description of the vulnerability
- Steps to reproduce: Step-by-step instructions to reproduce the issue
- Affected versions: Which versions of Sealos are affected
- Potential impact: Assessment of the potential security impact
- Environment details: Operating system, Kubernetes version, and other relevant environment information
- Proof of concept: If applicable, include a proof of concept (but please be responsible)
- Suggested fix: If you have ideas for a fix, please share them (optional but appreciated)
- Initial acknowledgment: We will acknowledge receipt of your report within 48 hours
- Status updates: We will provide regular updates on the progress of our investigation
- Triage: Our security team will review and triage your report
- Investigation: We will investigate the vulnerability and assess its impact
- Fix development: We will work on developing and testing a fix
- Timeline: We aim to address critical vulnerabilities within 14 days of confirmation
- Coordination: We will keep you informed throughout the process and coordinate on disclosure timing
After a fix has been developed, tested, and released:
- Credit: We will give you appropriate credit for the discovery (unless you prefer to remain anonymous)
- Public disclosure: We will issue a public security advisory through GitHub Security Advisories (GHSA)
- User notification: Users will be notified through our standard communication channels
- Disclosure timing: We follow responsible disclosure practices, typically allowing 90 days for users to update before full public disclosure
We treat security vulnerabilities as our highest priority. Our approach to security includes:
- Proactive security: We continuously work to improve the security of Sealos
- Responsible disclosure: We believe in coordinated disclosure that protects users while giving credit to researchers
- Community collaboration: We work closely with the security research community
- Transparency: We strive to be transparent about security issues while protecting users during the remediation process
Users will be notified of security updates through the following channels:
- GitHub Releases: Security fixes will be clearly marked in release notes with a
[SECURITY]prefix - GitHub Security Advisories (GHSA): Critical security vulnerabilities will be published as GitHub Security Advisories
- Project Documentation: Security updates will be documented in our official documentation
- Community Channels: Important security updates may be announced through our official community channels
For any questions about this security policy, please contact us at [email protected].