Versus Incident handles incident data, webhook secrets, and on-call routing keys. We take security reports seriously and aim to acknowledge every report quickly.
Security fixes are issued against the latest minor release. Older minor versions are not patched.
| Version | Supported |
|---|---|
latest 1.x |
✅ |
older 1.x |
❌ — please upgrade |
0.x |
❌ |
Please do not open a public GitHub issue for security reports.
Use one of the following private channels:
- GitHub Security Advisory (preferred): https://github.com/VersusControl/versus-incident/security/advisories/new
- Email:
supports@devopsvn.techwith the subject line[SECURITY] versus-incident: <short summary>.
When reporting, please include:
- Affected version(s) and deployment mode (Docker, Helm, source build)
- Reproduction steps or proof-of-concept
- Impact (information disclosure, RCE, privilege escalation, etc.)
- Any suggested fix or mitigation
You should expect:
- Acknowledgement within 3 business days.
- Initial triage and severity assessment within 7 business days.
- Fix or mitigation plan depending on severity:
- Critical / High → patch release as soon as a fix is verified.
- Medium → next scheduled release.
- Low → tracked publicly once a fix is available.
- A CVE / GHSA advisory for any vulnerability that affects published releases.
We are happy to credit reporters in the advisory unless you prefer to remain anonymous.
- Reports against unsupported versions (please upgrade and re-test).
- Issues that require an attacker to already control the host running Versus Incident, the Redis instance, or the configured AI provider.
- Findings that depend on misconfiguration explicitly documented as
development-only (e.g.
redis.insecure_skip_verify: true). - Denial-of-service via unbounded request volume to the public
/api/incidentsendpoint when no rate-limiting/proxy is deployed in front. Operators are expected to terminate TLS and rate-limit at the edge.
- Run Versus Incident behind an authenticated reverse proxy. The
/api/incidentsendpoint is intentionally unauthenticated so monitoring tools can post directly; restrict it at the network layer. - Set a strong
agent.gateway_secretif the AI agent admin endpoints (/api/agent/*) are exposed. - Use TLS to Redis in production. Do not set
redis.insecure_skip_verify: trueoutside development. - Provide all tokens, webhook URLs, and routing keys via environment variables — never commit them to YAML.
- Enable redaction (
agent.redaction.enable: true, default) before pointing the agent at production logs.