This file documents the current status of dependency vulnerability scanning and code scanning for Pulsarr, and provides quick next steps to enable automated protection.
- Dependabot alerts: Partially enabled
- Code scanning alerts: Enable
- Secret scanning alerts: Enabled
-
Dependabot alerts disabled: the repository will not automatically receive dependency vulnerability alerts or automatic PR fixes from Dependabot until enabled. To enable: go to the repository Settings -> Security -> Configure Dependabot.
-
Code scanning needs setup: no automated static analysis is currently configured. We recommend enabling CodeQL (GitHub Code Scanning) or integrating a CI step with a static analyzer. See: https://docs.github.com/en/code-security/secure-your-code
-
Secret scanning enabled: GitHub will detect and notify administrators for likely secrets committed to the repository. Ensure any detected secrets are rotated immediately.
- Enable Dependabot alerts and optionally Dependabot security updates.
- Configure GitHub Code Scanning (CodeQL) via the Security tab or add a CI workflow for scanning.
- Review any historical secret scanning findings and rotate secrets if necessary.
Thank you for taking responsibility and reporting potential security issues in Pulsarr.
At present this repository does not accept private vulnerability reports via a configured private channel. Please follow the instructions below.
- Public reporting (preferred / default)
- Open a new GitHub Issue in this repository and use the prefix
SECURITY:in the title, for example:
SECURITY: SQL injection in parsing module
-
In the issue body include: affected component, reproducible steps, versions, PoC (if available), and your contact information.
-
Set the issue labels to
security(maintainers will triage).
- Private reporting (optional - not currently configured)
- If you require a private disclosure channel, reach out to the repository maintainers directly. Add an email contact in this file or create a private disclosure process and update this document. Example placeholder (update before public use):
security@your-organization.example.
- Response expectations
- Maintainers aim to acknowledge reports within 72 hours and will publish remediation guidance or advisories via GitHub Security Advisories when appropriate.
- Sensitive data
- Do not paste secrets or full private keys into public issues. If you accidentally committed a secret, enable secret rotation immediately and notify maintainers.
- If you are a security researcher
- If you would like credit, indicate in your report whether you'd like to be listed in the
SECURITY.mdor an advisory as the reporter.
Maintainers: please replace the placeholder contact email above with an actual private disclosure address if you want to enable private reporting.