We provide security updates for the following versions of Smart RDS Viewer:
| Version | Supported | Status |
|---|---|---|
| 1.x.x | ✅ | Active development |
| 0.x.x | ❌ | No longer supported |
Note: We recommend always using the latest version available on PyPI for the most recent security fixes and improvements.
Smart RDS Viewer requires AWS credentials to function. Please follow these security best practices:
- Never commit AWS credentials to version control
- Use IAM roles when running on EC2 instances
- Use AWS profiles with MFA when possible
- Rotate access keys regularly
- Use temporary credentials (STS) when available
The application requires these minimum AWS permissions:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"rds:DescribeDBInstances",
"cloudwatch:GetMetricStatistics",
"pricing:GetProducts"
],
"Resource": "*"
}
]
}# Use MFA-enabled profiles
export AWS_PROFILE=your-mfa-profile
export AWS_REGION=your-region
# Avoid using root credentials
# Create dedicated IAM user with minimal permissions- Cache Location:
/tmp/rds_pricing_cache.json - Data Stored: Pricing information only (no credentials)
- Retention: 24 hours automatic expiration
- Permissions: Readable only by the user who created it
The application handles:
- ✅ Safe: RDS instance metadata, pricing data, CloudWatch metrics
⚠️ Caution: Instance names may contain sensitive information- ❌ Never: Database credentials, connection strings, or user data
The application connects to these AWS endpoints:
rds.<region>.amazonaws.com- RDS metadatamonitoring.<region>.amazonaws.com- CloudWatch metricsapi.pricing.us-east-1.amazonaws.com- Pricing data
All AWS API communications use HTTPS with certificate validation.
We take security seriously. If you discover a security vulnerability, please follow these steps:
- Do NOT create a public GitHub issue
- Email security concerns to: hello@kratik.dev
- Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Initial Response: Within 48 hours
- Confirmation: We'll confirm if the issue is a valid security concern
- Timeline: Security fixes are prioritized and typically released within 7-14 days
- Credit: You'll be credited in the release notes (if desired)
- Assessment: Evaluate severity and impact
- Fix Development: Create and test security patch
- Release: Publish updated version to PyPI
- Notification: Update this document and release notes
- Advisory: Create security advisory if warranted
# Verify package integrity
pip install smart-rds-viewer
# Install from trusted sources only
# Avoid installing from unofficial repositories# Run with minimal AWS permissions
export AWS_PROFILE=readonly-profile
# Use dedicated IAM user for monitoring
# Avoid using administrative credentials
# Clear cache if running on shared systems
rm -f /tmp/rds_pricing_cache.json- Shared Systems: Be aware that cache files are stored in
/tmp - CI/CD: Use service roles instead of long-lived access keys
- Containers: Mount credentials securely, avoid embedding in images
- Logging: Application logs don't contain sensitive data
- Location: World-readable
/tmpdirectory - Mitigation: Files contain only pricing data, no credentials
- Recommendation: Clear cache on shared systems
- Behavior: May include AWS account IDs in error messages
- Mitigation: Don't share error logs publicly without review
- Recommendation: Redact account-specific information when reporting issues
- TLS: All AWS API calls use HTTPS
- Monitoring: Network traffic may reveal AWS usage patterns
- Recommendation: Use VPC endpoints for additional security
| Date | Version | Description |
|---|---|---|
| TBD | 1.0.0 | Initial security policy establishment |
We regularly monitor our dependencies for security vulnerabilities:
- boto3: AWS SDK - Updated regularly
- rich: Terminal UI - Stable, well-maintained
- requests: HTTP library - Security-focused maintenance
- Monitor security advisories for all dependencies
- Update dependencies promptly when security fixes are available
- Use
pip-auditor similar tools to scan for vulnerabilities
- No PII: Application doesn't collect or store personally identifiable information
- AWS Data: Only accesses metadata and metrics (no user data)
- Logging: Minimal logging, no sensitive data retention
- Follow OWASP guidelines for secure coding
- Implement least-privilege access principles
- Use secure communication protocols (TLS 1.2+)
Security is a shared responsibility. Please help us keep Smart RDS Viewer secure by following these guidelines and reporting any concerns promptly.
For general questions about security practices, please refer to the AWS Security Best Practices documentation.