| Version | Supported |
|---|---|
| 0.x | ✅ |
We take security vulnerabilities in nr-vault seriously. If you discover a security issue, please report it responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Use GitHub's private security reporting feature:
Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability within 7 days
- Resolution: Critical vulnerabilities will be patched within 30 days
- Disclosure: We follow responsible disclosure practices
This extension handles sensitive data (API keys, credentials, secrets). Key security features:
- Envelope Encryption: AES-256-GCM with per-secret Data Encryption Keys
- Master Key Protection: Stored outside database (file, env, or derived)
- Access Control: Backend user group-based permissions
- Audit Logging: Tamper-evident hash chain for all operations
- Memory Safety: Sensitive data wiped with
sodium_memzero()
When using nr-vault:
-
Master Key Storage
- Store master key outside webroot
- Use file permissions 0400
- Never commit to version control
- Backup separately from database
-
Access Control
- Restrict CLI access unless needed
- Use context-based permission scoping
- Review audit logs regularly
-
Operations
- Rotate master key annually
- Rotate secrets after personnel changes
- Monitor for
access_deniedevents
This extension has not yet undergone a formal security audit. If you are interested in sponsoring a security audit, please open a discussion or reach out through the GitHub project.
We appreciate responsible disclosure and will acknowledge security researchers who report valid vulnerabilities (unless they prefer to remain anonymous).