| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
-
GitHub Security Advisories (Preferred): Use the Security Advisories feature to privately report the vulnerability.
-
Email: Contact the maintainer directly at the email address listed in the repository.
When reporting a vulnerability, please include:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any suggested fixes (if applicable)
- Initial Response: Within 48 hours of receiving your report
- Status Update: Within 7 days with an assessment and remediation plan
- Resolution: Depending on complexity, typically within 30 days
- Acknowledgment: We will acknowledge receipt of your report within 48 hours.
- Assessment: We will investigate and assess the severity of the issue.
- Communication: We will keep you informed of our progress.
- Resolution: Once fixed, we will release a patch and credit you (unless you prefer to remain anonymous).
- Disclosure: We will coordinate with you on public disclosure timing.
- Never commit API tokens to version control
- Use
pulumi config set webflow:apiToken <token> --secretto securely store tokens - Alternatively, use the
WEBFLOW_API_TOKENenvironment variable - Rotate tokens regularly
- Use tokens with minimal required permissions
- Review Pulumi state files for sensitive data before sharing
- Use Pulumi's built-in encryption for secrets
- Consider using Pulumi Cloud or a secure backend for state storage
This provider implements several security measures:
- TLS 1.2+: All API communications enforce TLS 1.2 or higher
- Token Redaction: API tokens are never logged in plain text
- Input Validation: All inputs are validated before API calls
- Rate Limiting: Automatic retry with backoff for rate-limited requests
- SBOM Generation: Software Bill of Materials included with releases
- SLSA Build Level 2 Provenance: Build provenance attestations for Go binaries produced via standard GitHub Actions workflows (verifiable with
gh attestation verify; not SLSA Level 3) - Signed Package Releases: npm and PyPI packages published with Sigstore attestations
We appreciate the security research community's efforts in helping keep this project secure. Contributors who report valid security issues will be acknowledged here (with permission).