File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1+ version : 2
2+ updates :
3+ # Go modules
4+ - package-ecosystem : gomod
5+ directory : /
6+ schedule :
7+ interval : weekly
8+ commit-message :
9+ prefix : " deps"
10+ labels :
11+ - dependencies
12+ open-pull-requests-limit : 10
13+
14+ # GitHub Actions
15+ - package-ecosystem : github-actions
16+ directory : /
17+ schedule :
18+ interval : weekly
19+ commit-message :
20+ prefix : " ci"
21+ labels :
22+ - dependencies
23+ - ci
24+
25+ # npm (VS Code extension)
26+ - package-ecosystem : npm
27+ directory : /vscode-mdl
28+ schedule :
29+ interval : weekly
30+ commit-message :
31+ prefix : " deps"
32+ labels :
33+ - dependencies
Original file line number Diff line number Diff line change 2424 timeout-minutes : 30
2525 - name : Lint Go
2626 run : make lint-go
27+ - name : Vulnerability scan
28+ run : |
29+ go install golang.org/x/vuln/cmd/govulncheck@latest
30+ govulncheck ./...
2731 - name : Check MDL example scripts
2832 run : |
2933 FAILED=0
Original file line number Diff line number Diff line change 1+ # Security Policy
2+
3+ ## Reporting a Vulnerability
4+
5+ If you discover a security vulnerability in this project, please report it responsibly.
6+
7+ ** Do NOT open a public GitHub issue for security vulnerabilities.**
8+
9+ Instead, please use one of the following methods:
10+
11+ 1 . ** GitHub Security Advisories** (preferred): [ Report a vulnerability] ( https://github.com/mendixlabs/mxcli/security/advisories/new )
12+ 2 . ** Email** : Send details to the repository maintainers via the email addresses listed in their GitHub profiles
13+
14+ ### What to include
15+
16+ - Description of the vulnerability
17+ - Steps to reproduce
18+ - Affected versions
19+ - Potential impact
20+ - Suggested fix (if any)
21+
22+ ### What to expect
23+
24+ - ** Acknowledgment** within 3 business days
25+ - ** Assessment** within 10 business days
26+ - ** Fix or mitigation** for confirmed vulnerabilities, coordinated with you before public disclosure
27+
28+ ## Supported Versions
29+
30+ | Version | Supported |
31+ | ---------| -----------|
32+ | Latest release | Yes |
33+ | Nightly builds | Best-effort |
34+ | Older releases | No |
35+
36+ ## Security Practices
37+
38+ - Dependencies are monitored via Dependabot
39+ - Go vulnerabilities are scanned with ` govulncheck ` in CI
40+ - CycloneDX SBOM is available via ` make sbom `
41+ - Release binaries are built with ` CGO_ENABLED=0 ` (no C dependencies)
You can’t perform that action at this time.
0 commit comments