We take security vulnerabilities seriously. If you discover a security issue in EPYON, please report it responsibly.
Please DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security vulnerabilities through one of the following methods:
-
GitHub Security Advisories (Preferred)
- Go to the Security tab of this repository
- Click "Report a vulnerability"
- Provide detailed information about the vulnerability
-
Email
- Send details to: [YOUR-EMAIL@example.com]
- Use subject line:
[SECURITY] EPYON Vulnerability Report - Include PGP key if available for encrypted communication
When reporting a vulnerability, please include:
- Description: Clear description of the vulnerability
- Impact: What could an attacker accomplish?
- Reproduction Steps: Detailed steps to reproduce the issue
- Affected Versions: Which versions of EPYON are affected?
- Environment: OS, shell version, tool versions if relevant
- Proof of Concept: Code, scripts, or commands demonstrating the issue
- Suggested Fix: If you have ideas for remediation (optional)
After you submit a report, you can expect:
- Acknowledgment: We will acknowledge receipt within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Updates: We will keep you informed of our progress
- Resolution: We aim to resolve critical issues within 30 days
- Credit: With your permission, we will credit you in the security advisory and changelog
- Triage: We assess severity using CVSS scoring
- Investigation: We reproduce and investigate the issue
- Development: We develop and test a fix
- Disclosure: We coordinate disclosure timing with the reporter
- Release: We release a patched version
- Advisory: We publish a security advisory
We provide security updates for the following versions:
| Version | Supported |
|---|---|
| 2.5.x | ✅ |
| < 2.5 | ❌ |
Recommendation: Always use the latest version to ensure you have the latest security patches.
When using EPYON Security Scanner:
- Keep Updated: Regularly update to the latest EPYON version
- Secure Credentials: Store API tokens and secrets securely
- Use GitHub Secrets for CI/CD environments
- Use
.envfiles with proper permissions for local use - Never commit credentials to version control
- Review Permissions: Ensure EPYON runs with minimal required permissions
- Scan Results: Treat scan results as sensitive - they may contain vulnerability details
- Network Security: When using SonarQube or external scanners, use secure connections (HTTPS)
- Input Validation: All scan inputs are validated before processing
- Dependency Management: Keep security tool dependencies updated
- Isolation: Scans run in isolated environments when possible
- Output Sanitization: Dashboard and reports sanitize user-controlled data
- Scope: Security testing should be performed on your own installations only
- Data Privacy: Do not include real vulnerability data from production systems
- Responsible Disclosure: Follow our vulnerability reporting process above
- Legal Compliance: Ensure your testing complies with applicable laws
EPYON includes several security-focused features:
- Multi-layer scanning: 11 integrated security tools covering different attack vectors
- Suppression management: Controlled exception handling with
.epyon-ignore.yml - Audit trails: Comprehensive scan manifests and metadata tracking
- Severity gating: Configurable thresholds to fail builds on critical findings
- Air-gapped support: Can operate in offline/restricted environments
- Integrity verification: File hashing and manifest validation
- STIG compliance: Alignment with security technical implementation guides
Scan results contain security findings and may reveal:
- Vulnerable dependencies in your codebase
- Exposed secrets or credentials (TruffleHog findings)
- Infrastructure misconfigurations (Checkov findings)
- Malware detections (ClamAV findings)
Action: Treat all scan artifacts as sensitive. Restrict access appropriately.
EPYON depends on third-party security tools:
- Trivy, Grype, Syft (Anchore)
- TruffleHog (Truffle Security)
- Checkov (Bridgecrew/Prisma Cloud)
- ClamAV
- SonarQube (optional)
Action: Monitor security advisories for these tools and update regularly.
EPYON executes in your environment with file system access.
Action:
- Review scripts before execution
- Use containerization or VMs for untrusted targets
- Apply principle of least privilege
- Critical vulnerabilities (CVSS 9.0-10.0): Patched within 7 days
- High vulnerabilities (CVSS 7.0-8.9): Patched within 30 days
- Medium vulnerabilities (CVSS 4.0-6.9): Patched within 90 days
- Low vulnerabilities (CVSS 0.1-3.9): Addressed in next release
Security patches will be released as:
- Patch versions for current minor version (e.g., 2.5.1)
- Backports for supported versions if applicable
We appreciate security researchers who help make EPYON more secure:
No vulnerabilities reported yet
For non-security issues:
- GitHub Issues: github.com/your-org/epyon/issues
- Documentation: See README.md
For security issues only:
- GitHub Security Advisory: Report a vulnerability
- Email: [YOUR-EMAIL@example.com]
This security policy is effective as of February 12, 2026
Last updated: February 12, 2026