kvDB is currently in early development (alpha / pre-release).
Only the latest version on the main branch is supported for security updates.
| Version | Supported |
|---|---|
| main (latest) | ✅ |
| Older releases | ❌ |
Security fixes are applied only to the latest codebase. Backports are not guaranteed.
If you discover a security vulnerability, please report it responsibly and privately.
- GitHub: Use GitHub Security Advisories (preferrered)
- Go to the repository
- Click Security → Advisories → New draft advisory
Please do not open a public GitHub issue for security vulnerabilities.
When reporting a vulnerability, include as much of the following as possible:
- A clear description of the issue
- Steps to reproduce
- Affected components (e.g., coordinator, gateway, storage engine, WAL, RPC layer)
- Potential impact (data loss, corruption, DoS, privilege escalation, etc.)
- Any proof-of-concept code or logs (if available)
We aim to follow this process:
- Acknowledgement within 72 hours
- Initial assessment and severity classification
- Fix development and validation
- Coordinated disclosure (if applicable)
Timelines may vary depending on complexity and severity.
- Data corruption or loss
- Authentication / authorization bypass (when applicable)
- Remote code execution
- Denial-of-service vectors
- Insecure default configurations
- gRPC / HTTP API vulnerabilities
- Persistence layer (WAL, snapshots, storage engine)
- Cluster coordination and membership logic
- Issues requiring physical access
- Vulnerabilities in third-party dependencies without a kvDB-specific exploit
- Theoretical attacks without practical impact
- Non-security bugs (use GitHub Issues instead)
kvDB is a distributed systems learning and research project and currently:
- Does not provide built-in encryption at rest
- Does not provide built-in authentication or authorization
- Assumes trusted internal networks by default
- Is not yet production-hardened
Running kvDB in hostile or untrusted environments is not recommended at this stage.
- Dependencies are managed via Maven
- Automated tooling (e.g., Dependabot) may be used to surface known vulnerabilities
- Critical dependency updates may be prioritized over feature work
We support responsible disclosure.
If you would like public credit for a vulnerability report, please indicate this in your report.
We appreciate the effort of the security community and researchers who help improve kvDB.
Responsible disclosure helps make the project stronger for everyone.