We release patches for security vulnerabilities. The following versions are currently being supported with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
The RACE team takes security seriously. We appreciate your efforts to responsibly disclose your findings.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
- GitHub Security Advisory: Use the GitHub Security Advisory feature (preferred method)
- Email: Contact the maintainers at Technative
- Private Issue: If you cannot use the above methods, create a private issue and mark it as security-related
When reporting a vulnerability, please include:
- Type of issue (e.g., command injection, privilege escalation, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 3 business days
- Updates: We will keep you informed about our progress towards a fix
- Timeline: We aim to release a fix within 90 days of the initial report
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
When using RACE, we recommend the following security practices:
- Always use AWS IAM roles with least privilege principle
- Never commit AWS credentials to version control
- Use AWS SSO or temporary credentials when possible
- Set
AWS_PROFILEenvironment variable appropriately
- Store
.tfbackendfiles securely - Use encrypted storage for sensitive backend configurations
- Review backend configurations before committing
- Use
.gitignoreto prevent accidental commits of sensitive files
- Never commit sensitive data in
.tfvarsfiles - Use encrypted backends for state files
- Consider using tools like
git-secretsordetect-secrets - Use environment variables or secret management systems for sensitive values
- Always use encrypted S3 buckets for Terraform state
- Enable versioning on state bucket
- Restrict access to state files using IAM policies
- Enable DynamoDB state locking
- Review
flake.lockfile regularly - Use pinned versions for critical dependencies
- Audit Nix expressions before execution
- Review scripts before execution, especially when using
race nixrun - Use the Nix project confirmation feature
- Be cautious when running scripts from untrusted sources
- Understand what each command does before executing
RACE includes several security features:
The tfdestroy script prevents accidental destruction of critical resources:
- Backend infrastructure
- DynamoDB tables
- KMS keys
When .nix files are detected, RACE asks for confirmation before executing potentially destructive commands.
Critical operations require interactive confirmation to prevent accidental execution.
RACE scripts accept user input and execute shell commands. While we've implemented safeguards, users should:
- Only use RACE in trusted environments
- Review scripts before execution
- Not accept untrusted input to RACE commands
RACE reads and writes files in your project directory:
- Ensure proper file permissions on your project
- Use RACE in directories you trust
- Review changes before committing
RACE requires AWS credentials to function:
- Use least privilege IAM roles
- Monitor CloudTrail logs for RACE actions
- Implement proper access controls
Security updates will be released as patch versions (e.g., 0.1.x). We recommend:
- Always using the latest version
- Subscribing to GitHub releases
- Checking the CHANGELOG for security-related updates
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release patches as quickly as possible
This security policy applies to:
- All RACE scripts and tools
- Integration with Terraform/OpenTofu
- Integration with AWS services
- Integration with Nix
Out of scope:
- Terraform/OpenTofu vulnerabilities (report to HashiCorp/OpenTofu project)
- AWS service vulnerabilities (report to AWS)
- Third-party dependencies (report to respective projects)
For security concerns or questions about this policy, please contact the maintainers through the methods listed above.
Note: This security policy is subject to change. Please check back regularly for updates.