| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security seriously. If you discover a security vulnerability within OpenLoadBalancer, please follow these steps:
- Do not open a public issue
- Email security@openloadbalancer.dev with details
- Include steps to reproduce, impact assessment, and suggested fix if possible
- Allow up to 48 hours for initial response
- We will coordinate disclosure timeline with you
- Reproducible builds with Go modules
- SBOM generation for every release
- Dependency scanning in CI/CD
- Static analysis with go vet, staticcheck
- Non-root container execution
- Seccomp and AppArmor profiles
- Capability dropping (CAP_NET_BIND_SERVICE only)
- Read-only root filesystem
- Privilege escalation disabled
- TLS 1.3 with secure cipher suites
- mTLS support with client certificate verification
- OCSP stapling
- PROXY protocol support
- 6-layer protection pipeline
- SQLi, XSS, CMDi, Path Traversal, XXE, SSRF detection
- Bot detection with JA3 fingerprinting
- Rate limiting with auto-ban
- Use non-root user (UID 1000)
- Enable mTLS for admin API
- Configure WAF in enforce mode
- Enable request/response logging
- Use dedicated certificates
- Enable OCSP stapling
- Configure IP ACL whitelist
- Enable rate limiting
- Use secrets management for tokens
- Enable audit logging
- GeoIP data is simplified; production use requires MaxMind GeoIP2
- Distributed rate limiting requires Redis for cluster-wide coordination
- Request body logging may capture sensitive data (use data masking)
Security advisories will be published at:
- GitHub Security Advisories
- openloadbalancer.dev/security
- security@openloadbalancer.dev mailing list