The security of Splunk App Deployer is important to us. If you believe you have found a security vulnerability, please report it responsibly.
π¨ Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
- Security Email: security@moosequest.net
- General Contact: opensource-kris@moosequest.net
- Subject:
[SECURITY] Splunk App Deployer - [Brief Description]
Please include as much information as possible:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact and attack scenarios
- Affected versions (if known)
- Proposed fix (if you have one)
- Your contact information for follow-up
- Initial Response: Within 48 hours of receiving your report
- Status Update: Within 7 days with preliminary assessment
- Resolution: Security fixes will be prioritized and released as soon as possible
We provide security updates for the following versions:
| Version | Supported |
|---|---|
| 1.0.x | β Yes |
| < 1.0 | β No |
- Code injection vulnerabilities
- Path traversal attacks
- Privilege escalation issues
- Credential exposure risks
- Command injection vulnerabilities
- File system access beyond intended scope
The Splunk App Deployer includes several security measures:
- β Input validation for file paths and app names
- β Path sanitization to prevent directory traversal
- β Read-only operations for app discovery and validation
- β Explicit permission handling for file operations
- β No external dependencies (reduces attack surface)
- β No network communication except for Git operations
- β Local-only operations (no remote code execution)
- Run with minimal privileges - Don't run as root/administrator unless necessary
- Validate app sources - Only deploy apps from trusted sources
- Review app contents - Inspect apps before deployment
- Use version control - Track all changes through Git
- Regular updates - Keep the deployer updated to the latest version
- Backup verification - Ensure backups are created and valid
- Log monitoring - Review deployment logs for suspicious activity
- Development: Use isolated environments for testing
- Production: Limit access to deployment tools and Splunk directories
- Credentials: Use proper authentication for Git operations
- Network: Consider network isolation for sensitive deployments
The following are generally considered out of scope for security reports:
- Issues in third-party dependencies (we use only Python standard library)
- Social engineering attacks
- Physical access to systems
- Issues requiring physical access to the deployment machine
- Splunk security issues (report those to Splunk directly)
- Operating system vulnerabilities
- All changes undergo review before merging
- Security implications are considered for all modifications
- Input validation is required for user-provided data
- Path traversal prevention is tested
- Input validation is verified
- File permission handling is validated
- Error handling prevents information disclosure
- Zero external dependencies policy reduces attack surface
- Python standard library only
- No network dependencies for core functionality
We follow responsible disclosure practices:
- Private reporting of vulnerabilities
- Collaborative investigation with the reporter
- Coordinated public disclosure after fixes are available
- Credit attribution to security researchers (with permission)
- Immediate: Critical vulnerabilities affecting data integrity
- 30 days: High-severity vulnerabilities
- 90 days: Medium and low-severity issues
- Coordinated: With reporter agreement when possible
For significant vulnerabilities, we will:
- Create a security advisory on GitHub
- Notify users through repository notifications
- Provide migration guidance if needed
- Document the fix in release notes
We maintain a security hall of fame for researchers who responsibly disclose vulnerabilities:
No security issues have been reported yet. Be the first to help make Splunk App Deployer more secure!
- We appreciate responsible disclosure
- Security researchers will be credited (with permission)
- Significant findings may receive public recognition
- Primary Contact: Kristerpher Henderson
- Security Email: security@moosequest.net
- General Contact: opensource-kris@moosequest.net
- GitHub: @MooseQuest
- Response Time: Within 48 hours
- GitHub Security Features: Security Policy
- Splunk Security: Splunk Security Documentation
- Python Security: Python Security Guidelines
Last Updated: July 24, 2025 Version: 1.1.3
Thank you for helping keep Splunk App Deployer secure! π