| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| 1.x.x | ❌ |
If you discover a security vulnerability in PSKReporter HA Bridge, please report it responsibly:
- Do NOT open a public issue
- Email: pentafive@gmail.com with subject "pskr-ha-bridge Security Issue"
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix timeline: Depends on severity, typically 1-4 weeks
- MQTT credentials are stored in environment variables (Docker) or HA config (HACS)
- Never commit
.envfiles - only.env.examplewith placeholders - Consider using Docker secrets or a secrets manager in production
- The bridge connects to PSKReporter MQTT (mqtt.pskreporter.info)
- The bridge connects to your local MQTT broker (Docker mode only)
- PSKReporter supports TLS (MQTT_TLS, MQTT_WS_TLS modes)
- Restrict network access to the bridge container if using Docker
- Amateur radio callsigns are inherently public information
- No personal data beyond callsigns is transmitted or stored
- Spot data originates from the public PSKReporter feed
- Consider filtering callsigns if you want to limit exposure
- Debug mode may log callsigns and spot data
- Keep
DEBUG_MODE=Falsein production - Review logs before sharing in issue reports
This security policy covers:
- The
pskr-ha-bridge.pyscript - The
custom_components/pskr/HACS integration - Docker configuration files
- Example configurations
It does NOT cover:
- PSKReporter.info service security
- Home Assistant security
- MQTT broker security