While the project is in 0.x, only the latest minor release line receives
security fixes. Once 1.0.0 ships, support will extend to the previous
minor.
| Version | Supported |
|---|---|
| 0.9.x | Yes |
| < 0.9 | No |
Please do not report security vulnerabilities through public GitHub issues.
Email us at info@fourninecloud.com with:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any proof-of-concept code (if applicable)
We will acknowledge receipt within 48 hours and provide a status update within 7 days.
- Report received and acknowledged within 48 hours
- Vulnerability confirmed or rejected within 7 days
- Fix developed and tested
- Security advisory published and patched release issued
- 90-day disclosure deadline from initial report — after which the reporter may disclose publicly
This project is an Electron desktop application that:
- Reads AWS and GCP credentials from local environment/config
- Stores encrypted credentials locally using AES-256-GCM
- Makes API calls to AWS and GCP on behalf of the authenticated user
Out of scope: social engineering, physical attacks, issues in third-party dependencies (report those upstream).
- Use IAM roles with least-privilege permissions
- Enable password protection in the app settings
- Do not share your local database file (
aws-analyzer.db) - Rotate AWS/GCP credentials regularly
- All third-party GitHub Actions are pinned by commit SHA, not by tag (defense against tag-rewrite attacks like GHSA-69fq-xp46-6x23).
- CI runs CodeQL (
security-extended), Trivy (filesystem + secrets),npm audit, dependency-review on every PR, and OSSF Scorecard weekly. - Dependabot opens grouped PRs for npm and
github-actionsweekly. mainis protected: PR + 1 review + green CI, no force-pushes, no deletions, linear history.- Releases are gated on signed
v*tag pushes only — see RELEASING.md.