Comprehensive security policies, tools, and guidelines to protect our open source ecosystem and users.
Report a VulnerabilitySecurity issues should be reported via our dedicated HackerOne portal. We track all reports with unique identifiers and response SLAs.
🔐 Learn how to report →All repositories use automated security audits (SonarQube, Snyk) and enforce dependency scanning via GitHub Actions.
📋 View developer guide →Automated checks for vulnerable dependencies in our CI/CD pipelines. Real-time alerts for dependency drift.
All production binaries and Docker images are cryptographically signed and verified.
Real-time scanning for credentials leaked in pull requests. Automated revocation workflows.
All new contributors go through our contributor security onboarding. This includes 2FA setup, GitHub SSO, and temporary access tokens.
We use fine-grained permissions with automated expiration for fork contributors. Pull request approvals require at least two security-focused reviews.
Automated test coverage for security-critical code
Average response time for vulnerability reports
Unpatched critical vulnerabilities in active codebase