We provide security updates for the following versions:
| Version | Supported |
|---|---|
| latest | ✅ |
| daily builds | ✅ |
If you discover a security vulnerability in this project, please report it by:
- DO NOT create a public GitHub issue
- Send an email to the maintainer with details of the vulnerability
- Include steps to reproduce the issue
- Provide any relevant logs or error messages
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if known)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Fix and Release: Varies based on severity
When using these Docker images:
- Never use default passwords - Always change
JUPYTER_TOKENin production - Use HTTPS - Configure TLS for JupyterLab in production environments
- Limit network exposure - Use firewalls and proper network segmentation
- Regular updates - Pull latest images regularly for security patches
- Resource limits - Set appropriate memory and CPU limits in Kubernetes
- Secrets management - Use Kubernetes secrets or similar for sensitive data
- Images run with non-root user by default
- JupyterLab runs with token authentication
- Spark uses cluster authentication in Kubernetes mode
- S3 credentials should be provided via environment variables or IAM roles