Skip to content

Security: uinaf/dotfiles

Security

SECURITY.md

Security

Reporting a Vulnerability

Email dev@uinaf.dev.

Do not open a public issue for secrets, credential exposure, signing key problems, or anything that could help compromise a machine.

Environment Secrets

Environment variables are process state, not secure storage. Any program run in that environment can read them and pass them to child processes.

Do not place long-lived service tokens in shell startup files, launchd plists, process-compose YAML, or tracked dotenv files. Store them in machine-local secret storage, such as a root-owned token file on a headless devbox, and fetch them inside the smallest wrapper that needs them. Generated secret files must be owner-only, usually a 0711 root-owned directory and 0400 service-user-owned file when another Unix user has to read them.

Local Audits

Run ./scripts/audit/repo.sh for repo secret scans and optional check-only macOS Security Compliance Project checks. Run ./scripts/audit/personal.sh on personal Macs and ./scripts/audit/devbox.sh on each shared devbox user to check local secret boundaries, identity state, and common stale backup locations. These scripts are non-destructive and do not print secret values.

See Security audits for the audit layers, mSCP setup, CI secret scanning, devbox drift checks, and maintenance rules.

What to Include

  • Affected file, script, or setup step.
  • Reproduction steps.
  • Impact.
  • Suggested mitigation, if you have one.

Response Expectations

We triage reports as quickly as possible. This is a public dotfiles repo, so most fixes should be small script, documentation, or configuration changes.

There aren't any published security advisories