If you discover a security vulnerability in curiOS, please use GitHub's built-in Report a Vulnerability feature for a private and secure disclosure.
When reporting, include:
- A clear description of the vulnerability
- Which container image(s) are affected
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Suggested fix (if you have one)
We provide security updates only for the main branch and the most recent stable release.
Older releases may receive critical security fixes on a best-effort basis.
Security fixes are released as:
- New
:latest
tags pointing to patched versions - Version-specific tags (e.g.,
:1.2.3
) for stable releases - Updated
:edge
tags from the main branch
We recommend:
- Use specific version tags (
:1.2.3
) for production deployments - Monitor GitHub releases and security advisories
- Test
:latest
in staging before deploying to production
When using curiOS containers:
- Use specific version tags for reproducibility and control
- Run with minimal privileges - avoid
--privileged
unless necessary - Use read-only root filesystems where possible (
--read-only
) - Mount configs as read-only (
:ro
suffix on volume mounts) - Keep host systems updated - container security depends on the host
- Monitor for updates - subscribe to GitHub releases
curiOS containers are built on Buildroot, which includes various upstream components. We track security advisories for:
- Buildroot itself
- Linux kernel (for system container)
- Individual packages (nftables, ntpd, BusyBox, etc.)
We appreciate the efforts of the security community to help improve the security of curiOS. Thank you for your responsible disclosure.