We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 1.3.x | ✅ |
| 1.2.x | ✅ |
| 1.1.x | ❌ |
| < 1.1 | ❌ |
We take the security of NextSight seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Open a public GitHub issue for security vulnerabilities
- Disclose the vulnerability publicly before it has been addressed
- Exploit the vulnerability for malicious purposes
- Email us directly at: security@nextsight.local
- Include the following in your report:
- Type of vulnerability (e.g., SQL injection, XSS, authentication bypass)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours.
- Communication: We will keep you informed of the progress towards a fix.
- Timeline: We aim to address critical vulnerabilities within 7 days and high-severity issues within 30 days.
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous).
- Always change default credentials before deploying to production
- Use strong, unique passwords for all accounts
- Enable RBAC and follow the principle of least privilege
- Rotate JWT secrets regularly
- Set appropriate token expiration times
- Deploy NextSight behind a reverse proxy with TLS/SSL
- Use network policies to restrict pod-to-pod communication
- Limit API access to trusted networks
- Enable rate limiting on API endpoints
- Run NextSight with a non-root user
- Use read-only file systems where possible
- Apply Pod Security Standards (Restricted profile)
- Regularly update Kubernetes and container images
- Use private container registries
- Never commit secrets to version control
- Use Kubernetes Secrets or external secret managers (Vault, AWS Secrets Manager)
- Encrypt secrets at rest
- Rotate secrets regularly
- Enable audit logging for all API operations
- Monitor for suspicious activities
- Set up alerts for security-related events
- Regularly review access logs
NextSight includes built-in security features:
- Security Posture Dashboard: Real-time security monitoring
- RBAC Analysis: Identify overly permissive roles
- Network Policy Coverage: Ensure proper network segmentation
- Image Vulnerability Scanning: Detect CVEs in container images
- AI-Powered Remediation: Get intelligent security recommendations
We use the following tools to maintain dependency security:
- Dependabot: Automated dependency updates
- Trivy: Container and filesystem vulnerability scanning
- CodeQL: Static code analysis for security issues
- Secret Scanning: Detect exposed secrets in code
Security updates are released as patch versions (e.g., 1.3.1) and announced via:
- GitHub Security Advisories
- Release notes in CHANGELOG.md
- Email notifications to registered users (if applicable)
We currently do not have a formal bug bounty program, but we appreciate responsible disclosure and will acknowledge security researchers who help improve NextSight security.
Thank you for helping keep NextSight and its users safe!