We actively support and provide security updates for the following versions of ArcDeploy:
| Version | Supported |
|---|---|
| 1.x.x | β |
| 0.9.x | β |
| < 0.9 | β |
We take security seriously and appreciate the security research community's efforts to help keep ArcDeploy and our users safe. If you believe you have found a security vulnerability in ArcDeploy, please report it responsibly.
Please DO NOT create public GitHub issues for security vulnerabilities.
Instead, use one of these secure methods:
- Go to the Security tab
- Click "Report a vulnerability"
- Fill out the security advisory form
- Submit privately to maintainers
- Security Email: security@arcdeploy.com
- PGP Key: Available at keybase.io/arcdeploy
- Subject Line:
[SECURITY] ArcDeploy Vulnerability Report
Please provide as much information as possible:
1. **Vulnerability Type**: (e.g., injection, privilege escalation, data exposure)
2. **Affected Component**: (e.g., cloud-init.yaml, documentation, configuration)
3. **Attack Vector**: (local, network, physical)
4. **Severity Assessment**: (low, medium, high, critical)
5. **Detailed Description**: Clear explanation of the vulnerability
6. **Reproduction Steps**: Step-by-step instructions
7. **Proof of Concept**: Code, commands, or screenshots
8. **Impact Assessment**: Potential damage and affected users
9. **Suggested Mitigation**: If you have ideas for fixes
10. **Discovery Credit**: How you'd like to be credited (optional)
We are committed to responding quickly to security reports:
| Timeline | Action |
|---|---|
| 24 hours | Initial acknowledgment |
| 72 hours | Preliminary assessment and severity rating |
| 7 days | Detailed analysis and reproduction |
| 14 days | Fix development and testing |
| 30 days | Public disclosure (if applicable) |
- Cloud-init configuration vulnerabilities
- Service configuration security issues
- Privilege escalation vulnerabilities
- Information disclosure issues
- Authentication and authorization bypasses
- Input validation vulnerabilities
- Dependency vulnerabilities in deployed services
- Network security misconfigurations
- Social engineering attacks
- Physical access attacks
- DDoS attacks
- Vulnerabilities in third-party cloud providers
- Issues requiring compromised credentials
- Theoretical attacks without practical impact
- Development tools and testing frameworks (report to ArcDeploy-Dev)
# Use strong SSH keys (minimum 2048-bit RSA or Ed25519)
ssh_authorized_keys:
- "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5... user@example.com"
# Configure minimal firewall rules
# Only open necessary ports
ufw:
- rule: allow
port: 22
proto: tcp
- rule: allow
port: 80
proto: tcp
- rule: allow
port: 443
proto: tcp- Regular Updates: Keep your deployed instances updated
- Strong Credentials: Use strong, unique SSH keys
- Firewall Configuration: Implement least-privilege network access
- Monitoring: Enable logging and monitoring
- Backup Strategy: Implement regular backups
- IAM Policies: Use minimal required permissions
- Network Security: Implement VPC/subnet isolation
- Encryption: Enable encryption at rest and in transit
- Access Logging: Enable CloudTrail/equivalent logging
# Check for secrets before committing
git diff --cached | grep -E "(password|secret|key|token)"
# Validate configurations
python3 -c "import yaml; yaml.safe_load(open('cloud-init.yaml'))"
# Test security configurations
# Verify firewall rules, service configurations, user permissions- No hardcoded secrets: Use placeholders only
- Input validation: Validate all user inputs
- Principle of least privilege: Minimal permissions
- Secure defaults: Security-first configuration
- Documentation: Document security implications
- SSH Key-only Authentication: Password authentication disabled
- Custom SSH Port: Port 2222 (security through obscurity + reduces noise)
- User Separation: Admin user (
arcblock) separate from service user (blockletd) - Privilege Isolation: Service runs as dedicated non-privileged user
- Systemd Security: Process sandboxing prevents privilege escalation
# Enhanced firewall configuration with localhost restrictions
ufw:
- rule: allow
port: 2222 # SSH (custom port)
- rule: allow
port: 80 # HTTP (public)
- rule: allow
port: 443 # HTTPS (public)
# Application ports restricted to localhost only
- rule: allow
from: 127.0.0.1
port: 8080 # Blocklet Server (localhost only)
- rule: allow
from: 127.0.0.1
port: 8081 # Health Check (localhost only)
- rule: allow
from: 127.0.0.1
port: 8443 # Blocklet HTTPS (localhost only)
- rule: deny
direction: incoming
policy: deny # Default deny- Service Isolation: Services run as dedicated non-privileged users (
blockletd) - Systemd Hardening: Process sandboxing with ProtectSystem, PrivateTmp, NoNewPrivileges
- Principle of Least Privilege: Application service runs without sudo access
- SSL/TLS Encryption: HTTPS enforced where possible
- Regular Updates: Automated security updates enabled
- Minimal Attack Surface: Only required services installed
- Network Isolation: Application ports restricted to localhost only
# System security configurations
write_files:
- path: /etc/ssh/sshd_config.d/99-security.conf
content: |
PasswordAuthentication no
PubkeyAuthentication yes
PermitRootLogin no
Port 2222
MaxAuthTries 3
LoginGraceTime 30- Root Access: Initial setup requires root privileges (drops to service user after)
- Update Management: Manual update process required
- Monitoring: Basic logging only, no advanced monitoring
- Certificate Management: Manual SSL certificate setup required
- Immediate Privilege Drop: Switch to non-root user after setup
- Service Isolation: Dedicated
blockletduser with no privileges - Network Segmentation: Application ports restricted to localhost
- Systemd Sandboxing: Filesystem and kernel protection enabled
- Firewall Rules: Strict network access controls with rate limiting
- Documentation: Clear update and maintenance procedures
- Community Tools: Advanced monitoring in ArcDeploy-Dev
- Review cloud-init configuration for sensitive data
- Verify SSH key is secure and properly formatted
- Confirm firewall rules are restrictive
- Check cloud provider security group settings
- Validate instance size meets security requirements
- Verify SSH access works with key-only authentication
- Test firewall rules are active and blocking unwanted traffic
- Confirm services are running with appropriate permissions
- Check system logs for any errors or security events
- Validate SSL/TLS certificates if applicable
- Regular system updates (weekly recommended)
- Monitor system logs for anomalies
- Review and rotate SSH keys periodically
- Backup important data and configurations
- Stay informed about ArcDeploy security updates
- Troubleshooting Guide - Security troubleshooting
- Cloud Provider Security Guides - Provider-specific security
- ArcDeploy-Dev Security Tools - Advanced security tools
- Security Team: security@arcdeploy.com
- Project Lead: lead@arcdeploy.com
- Emergency Contact: emergency@arcdeploy.com (critical issues only)
- Security Engineer: Available during business hours (UTC)
- On-call Rotation: 24/7 for critical vulnerabilities
- Community Moderators: GitHub discussions and issues
We recognize security researchers who help improve ArcDeploy security:
- First reporter will be listed here
- Responsible disclosure followed
- Valid security impact demonstrated
- Clear documentation provided
- Constructive approach taken
- Public acknowledgment (with permission)
- Security hall of fame listing
- CVE co-credit (for qualifying vulnerabilities)
- Community recognition in project updates
We commit to:
- No legal action for good faith security research
- Coordinated disclosure timeline respect
- Credit and recognition for valid findings
- Transparent communication throughout process
ArcDeploy aims to support compliance with:
- SOC 2 Type II - Security controls
- ISO 27001 - Information security management
- GDPR - Data protection (where applicable)
- HIPAA - Healthcare data security (with proper configuration)
- GitHub Security Advisories - Critical vulnerabilities
- GitHub Releases - Security patches and updates
- Mailing List - security-announce@arcdeploy.com
- RSS Feed - GitHub releases feed
- Security patch developed and tested
- Advisory published with details
- Notification sent to all channels
- Documentation updated with mitigation steps
- Community support provided for upgrades
Thank you for helping keep ArcDeploy secure! π
If you have any questions about this security policy or need clarification on the reporting process, please don't hesitate to contact our security team.
Last Updated: December 2025
Security Enhancements: Privilege isolation, systemd hardening, network segmentation
Next Review: June 2026