| Version | Supported |
|---|---|
| 0.1.x | ✅ Yes |
If you discover a security vulnerability in CAST — whether in the CLI, a workflow template, or the documentation — please do not open a public GitHub issue.
Instead, report it privately:
- Go to the Security Advisories page
- Click "Report a vulnerability"
- Provide a clear description, reproduction steps, and the potential impact
You can expect:
- Acknowledgement within 48 hours
- Status update within 7 days
- CVE assignment (if applicable) and coordinated disclosure once a fix is available
- Vulnerabilities in
castopssource code - Security misconfigurations in the workflow templates that could expose secrets or bypass security checks
- Supply-chain issues with pinned third-party actions used in templates
- Security issues in third-party tools integrated by the templates (Gitleaks, Semgrep, pip-audit, Trivy, Ruff) — please report these to their respective maintainers
- Issues that require an attacker to have write access to the target repository
The CAST workflow templates follow the principle of least privilege:
permissions:
contents: read # read-only checkout
security-events: write # required for SARIF upload to Security tab
actions: read # required for workflow status checksNo write access to repository contents is granted.
GITHUB_TOKENis used only by Gitleaks for GitHub API rate limit avoidanceSEMGREP_APP_TOKENis optional and used only to enable cloud rulesets- No credentials are ever printed in logs or stored as artifacts
All third-party actions in CAST templates reference immutable tags (e.g., @v4, @v2).
For production deployments requiring maximum supply-chain security, we recommend pinning
actions to their full commit SHA. See GitHub's
security hardening guide
for details.
We thank the security researchers and contributors who responsibly disclose vulnerabilities and help make CAST more secure.