| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability in 8311 HA Bridge, please report it responsibly:
- Do NOT open a public issue
- Email: pentafive@gmail.com with subject "8311-ha-bridge Security Issue"
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix timeline: Depends on severity, typically 1-4 weeks
- SSH credentials for WAS-110 are stored in environment variables
- MQTT credentials are stored in environment variables
- Never commit
.envfiles - only.env.examplewith placeholders - Consider using Docker secrets or a secrets manager in production
- The bridge connects to WAS-110 via SSH (port 22)
- The bridge connects to MQTT broker (default port 1883)
- Consider using MQTT over TLS (port 8883) if your broker supports it
- Restrict network access to the bridge container
- The bridge uses native SSH via subprocess
- SSH host key verification is disabled (
StrictHostKeyChecking=no) for ease of setup - For hardened environments, consider:
- Pre-populating
known_hosts - Using SSH key authentication instead of passwords
- Pre-populating
- Debug mode may log sensitive information
- Keep
DEBUG_MODE=Falsein production - Review logs before sharing in issue reports
This security policy covers:
- The
8311-ha-bridge.pyscript - Docker configuration files
- Example configurations
It does NOT cover:
- WAS-110 device security (see 8311 community)
- Home Assistant security
- MQTT broker security