| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability in pyre, please report it responsibly:
- Do not open a public issue
- Email details to the repository owner via GitHub private message
- Include steps to reproduce and potential impact
We will respond within 72 hours and work with you to address the issue.
pyre handles sensitive Palo Alto firewall API keys. Follow these practices:
Recommended:
- Use environment variables for API keys (
PYRE_API_KEY) - Use the
--api-keyflag for one-off connections - Use separate API keys per firewall with minimal required permissions
- Rotate API keys periodically
Avoid:
- Storing API keys in configuration files (not supported)
- Committing credentials to version control
- Sharing API keys between users
connections:
10.0.0.1:
insecure: false # Verify TLS certificatesThen provide the API key via environment:
export PYRE_API_KEY=YOUR_API_KEY
pyre -c 10.0.0.1- Keep
insecure: false(default) for production firewalls - Only use
insecure: truefor development/lab environments with self-signed certificates - Consider importing firewall certificates to your trust store instead of disabling verification
- pyre communicates with firewalls over HTTPS (port 443)
- Ensure network policies allow only authorized hosts to connect to firewall management interfaces
- Consider using jump hosts or VPNs for remote management
pyre uses these third-party libraries:
github.com/charmbracelet/bubbletea- TUI frameworkgithub.com/charmbracelet/bubbles- TUI componentsgithub.com/charmbracelet/lipgloss- Stylinggo.yaml.in/yaml/v4- YAML parsing
We monitor dependencies for vulnerabilities and update promptly when issues are disclosed.
pyre does not maintain its own audit logs. Firewall API calls are logged by PAN-OS according to your firewall's logging configuration. Review firewall logs to audit pyre usage.