We take the security of rung seriously. The following versions are currently being supported with security updates:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
We recommend always using the latest version of rung to ensure you have all security patches and improvements.
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in rung, please report it to us privately. This allows us to assess the issue and provide a fix before public disclosure.
Use GitHub's private vulnerability reporting feature:
- Go to https://github.com/auswm85/rung/security/advisories/new
- Click "Report a vulnerability"
- Fill out the advisory form with the following information:
- Description: A clear description of the vulnerability
- Impact: What kind of security issue is this? (e.g., code execution, information disclosure, privilege escalation)
- Steps to Reproduce: Detailed steps to reproduce the vulnerability
- Affected Versions: Which versions of rung are affected
- Proof of Concept: If possible, include code or commands that demonstrate the vulnerability
- Suggested Fix: If you have ideas on how to fix the issue, please share them
After you submit a report, here's what you can expect:
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Updates: We will keep you informed about our progress as we work on a fix
- Disclosure: Once a fix is available, we will coordinate with you on the disclosure timeline
- We will respond to your report in a timely manner
- We will keep you informed about our progress
- We will credit you for your discovery (unless you prefer to remain anonymous)
- We will not take legal action against researchers who:
- Make a good faith effort to avoid privacy violations and data destruction
- Only interact with their own accounts or test accounts
- Do not exploit the vulnerability beyond what is necessary to demonstrate it
When using rung, we recommend the following security practices:
- Use Personal Access Tokens (PATs): Rung requires a GitHub Personal Access Token for GitHub operations
- Minimal Permissions: Create tokens with only the permissions necessary for your workflow (typically
reposcope) - Token Storage: Store tokens securely using your system's credential manager
- Rotate Tokens: Regularly rotate your GitHub tokens
- Never Commit Tokens: Never commit tokens to version control
- SSH Keys: Use SSH keys for Git authentication when possible
- Signed Commits: Consider using GPG-signed commits for verification
- Review Changes: Always review the changes rung makes to your repository state
- Keep Updated: Always use the latest version of rung to benefit from security patches
- Verify Downloads: Verify the integrity of downloaded binaries using checksums
- Review Code: Review the source code and changes, especially if building from source
- Limit Scope: Use rung only in repositories you trust and control
Rung implements the following security features:
- Local State Management: Branch relationships and stack information are stored locally in Git configuration
- No Data Collection: Rung does not collect or transmit usage data
- Open Source: The entire codebase is open source and available for security review
- Minimal Dependencies: We minimize external dependencies to reduce the attack surface
Rung performs Git operations on your local repository, including:
- Creating and switching branches
- Rebasing branches
- Pushing to remote repositories
Recommendation: Always review the changes rung proposes before executing commands that modify your repository state.
Rung requires a GitHub Personal Access Token to:
- Create and update pull requests
- Add comments to pull requests
- Query repository information
Recommendation: Use fine-grained tokens with minimal required permissions when available.
Rung reads and writes to:
- Git configuration files (
.git/config) - Local Git objects and references
- Temporary files during operations
Recommendation: Only use rung in directories you trust and control.
When we receive a security vulnerability report, we follow this process:
- Confirmation: Confirm the vulnerability and determine its severity
- Development: Develop and test a fix
- Release: Release a patched version
- Disclosure: Publicly disclose the vulnerability after users have had time to update (typically 7-14 days after patch release)
- Credit: Credit the reporter in the release notes and security advisory (if they wish)
For critical vulnerabilities, we will:
- Request a CVE identifier
- Publish a GitHub Security Advisory
- Update documentation with mitigation steps
We welcome security audits of rung. If you're interested in performing a security audit, please contact us.
- No formal security audits have been conducted as of this writing
- Community contributions and reviews are always welcome
For security-related questions or concerns that are not vulnerability reports, you can:
- Open a discussion on GitHub Discussions (for general security questions)
- Open an issue on GitHub Issues (for non-sensitive questions)
This security policy may be updated from time to time. Significant changes will be announced through:
- GitHub release notes
- Project README
- Security advisories (if applicable)
Thank you for helping keep rung and its users safe!