Currently supported versions with security updates:
| Version | Supported | Notes |
|---|---|---|
| latest | ✅ | Latest stable Docker image |
| unstable | Development builds - use at own risk | |
| v0.x.x | ✅ | Tagged releases (when available) |
| < v0.1 | ❌ | Pre-release versions not supported |
- Conduct additional security reviews before production deployment
- Validate all authentication and network security implementations
- Test thoroughly in isolated environments first
- Monitor for unusual behavior in production environments
This application exposes several network services:
- ONVIF Service (Port 8080 By Default) - HTTP/SOAP endpoints with authentication
- RTSP Server (Port 8554 By Default) - Media streaming service
- WS-Discovery (UDP 3702) - Multicast device discovery protocol (if enabled)
The project implements multiple authentication methods:
- HTTP Basic Authentication - Credentials sent base64 encoded
- HTTP Digest Authentication - Challenge-response mechanism
- WS-Security - SOAP security with PasswordDigest/PasswordText support
Security Recommendations:
- Change default credentials (
admin/onvif-rust) in production - Use strong passwords for ONVIF authentication
- Consider network-level security (VPNs, firewalls) for sensitive deployments
- Automatic vulnerability scanning with Trivy in CI/CD pipeline
- Regular dependency updates through automated workflows
- Non-root user execution where possible
If you discover a security vulnerability within this project, please report it responsibly:
Use the GitHub Security Advisory feature:
- Go to the Security tab in the GitHub repository
- Click "Report a vulnerability"
- Fill out the security advisory form
- Provide detailed information about the vulnerability, including:
- Steps to reproduce
- Impact assessment
- Suggested mitigations or fixes
- Initial Response: Within 48 hours of report
- Assessment: Within 1 week for severity evaluation
- Fix Development: Timeline depends on severity and complexity
- Public Disclosure: After fix is available and deployed
-
Change Default Credentials
-e ONVIF_USERNAME="your-secure-username" -e ONVIF_PASSWORD="your-strong-password"
-
Network Security
- Use firewalls to restrict access to necessary ports only
- Consider running on private networks/VPNs for sensitive use cases
- Monitor network traffic for unusual patterns
-
Container Security
# Limit container capabilities docker run --cap-drop=ALL --cap-add=NET_BIND_SERVICE w4ff1e/onvif-media-transcoder:latest -
Monitoring and Logging
- Enable container logging and monitoring
- Watch for authentication failures and unusual access patterns
-
Dependency Security
- Regularly update Rust dependencies
- Review dependency licenses and security advisories
-
Code Review
- All changes should be reviewed for security implications
- Pay special attention to authentication and network code
- Validate AI-generated code components thoroughly
-
Testing
- Include security testing in CI/CD pipeline
- Test authentication mechanisms with various clients
- Validate input sanitization and error handling
- ONVIF Security Guidelines
- Docker Security Best Practices
- Rust Security Advisory Database
- NIST Container Security Guide
If you have suggestions on how this security policy could be improved, please:
- Submit a pull request with proposed changes
- Open an issue for discussion
- Contact the maintainers directly
We appreciate community feedback to enhance the security posture of this project.
Last Updated: July 2025
Policy Version: 2.0