At Semaphore, we take security seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please send reports about any security related issues you find to: support+security@semaphoreci.com
Please provide as much information as possible, including:
- A detailed description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any possible mitigations you've identified
- We will acknowledge receipt of your vulnerability report within 3 business day
- We will provide a more detailed response within 5 business days
- This will include our assessment of the vulnerability
- An expected timeline for a fix
- We will keep you informed about our progress
- Once the vulnerability is fixed, we will notify you
- Vulnerabilities in the open-source Semaphore codebase (outside of
ee/
directory) - Security issues in our documentation
- Vulnerabilities in our public infrastructure
- Authentication and authorization flaws
- Data exposure risks
- Vulnerabilities in Enterprise Edition code (
ee/
directory) - please report through your enterprise support channel - Social engineering attacks
- DOS/DDOS attempts
- Issues requiring physical access
- Issues in third-party applications or websites
- Always follow secure coding guidelines
- Never commit sensitive information (tokens, passwords, keys)
- Keep dependencies up to date
- Write tests for security-critical code
- Document security-relevant configuration
- Keep your installation up to date
- Regularly audit access controls
- Enable all recommended security features
- Monitor security announcements
- Security patches are given the highest priority
- Critical vulnerabilities are patched as soon as possible
- Security updates are clearly marked in release notes
- When possible, patches are backported to supported versions
- Users are notified through our security announcement channels
- We follow responsible disclosure principles
- Public disclosure is coordinated with the reporter
- Standard disclosure timeline is 90 days
- Timeline may be adjusted based on severity and mitigation complexity
Stay informed about security updates:
We believe in acknowledging security researchers who help us improve our security. Unless you prefer to remain anonymous, we will acknowledge your contribution in:
- Our security advisories
- Release notes