| Version | Supported |
|---|---|
| main | ✅ |
As the project is in early development, only the latest commit on main is supported with security fixes.
If you discover a security vulnerability, please report it responsibly:
- Do not open a public GitHub issue.
- Email simon@lauger.de with a description of the vulnerability.
- Include steps to reproduce, if possible.
You should receive a response within 7 days. Once confirmed, a fix will be developed and released as soon as possible.
The openvox-operator manages sensitive resources including:
- TLS certificates and private keys (stored in Kubernetes Secrets)
- CA private keys (stored in Kubernetes Secrets, never mounted into pods)
- Authentication tokens (for ReportProcessor and NodeClassifier endpoints)
The operator follows least-privilege principles. It requests only the permissions required by each controller. Namespace-scoped deployment is supported via scope.mode: namespace in the Helm chart.
All operator-managed pods run with:
- Non-root user (UID 1001)
readOnlyRootFilesystem(opt-in viareadOnlyRootFilesystem: trueon Config)allowPrivilegeEscalation: false- All capabilities dropped
- Seccomp profile: RuntimeDefault