Only the latest tagged release of aurtomator is supported. There are no backports to prior releases. If you run a fork, you are expected to track upstream and rebase or merge in fixes as they land. Unreleased main is considered unsupported between releases.
| Version | Supported |
|---|---|
| latest release | yes |
| older releases | no |
Report vulnerabilities privately through GitHub's Private Vulnerability Reporting. Do not open a public issue for security-impacting bugs.
- Navigate to https://github.com/staticwire/aurtomator/security/advisories/new.
- Fill in the advisory form: affected components, reproduction steps, impact, and any suggested mitigation.
- Attach proof-of-concept material as draft advisory attachments where possible, rather than linking to external services.
- Submit. The advisory is private between you and the maintainer until it is published.
Expect an initial acknowledgement within 7 days. aurtomator is a solo-maintained project. There is no formal SLA for triage, fix, or disclosure timelines beyond that initial acknowledgement, and timelines will vary with the severity and complexity of the issue. If you have not received an acknowledgement after 7 days, submit a new advisory noting the missed acknowledgement.
In scope:
scripts/— any defect that allows arbitrary code execution, secret exfiltration, or unintended writes outside the working tree.strategies/— injection via crafted upstream responses, YAML parsing issues, or command-injection through package configuration..github/workflows/— misconfiguration that leaksAUR_SSH_KEY,GPG_SIGNING_KEY,AUR_GIT_NAME, orAUR_GIT_EMAILsecrets into logs, artifacts, forks, pull requests, or third-party actions.- Anything else in this repository that can cause a fork to push a compromised package to AUR without the fork maintainer's intent.
Out of scope:
- Vulnerabilities in external tools invoked by aurtomator (
makepkg,yq,curl,git,namcap,shellcheck,shfmt,bats). Report those to their respective upstream projects. - The contents of AUR packages produced by forks. Each fork maintainer is responsible for the packages they publish; upstream aurtomator provides the automation framework, not the package contents.
- The fork-based distribution model itself (for example, "a malicious fork could push a bad package"). This is an inherent property of the template model and is documented in
README.md. - Issues in third-party GitHub Actions. Report to the action's maintainer; aurtomator pins by commit SHA to mitigate.
Once a reported issue is fixed, the private advisory is published on the repository's Security tab. If a CVE has been assigned through GitHub's CNA, it is referenced in the published advisory and in the release notes of the version that contains the fix. Forks inherit the fix on their next rebase or merge from upstream; fork maintainers are encouraged to subscribe to repository releases to receive notifications when a security-relevant release is published.