If you discover a security vulnerability in curiOS, please use GitHub's built-in Report a Vulnerability feature for a private and secure disclosure.
When reporting, include:
- A clear description of the vulnerability
- Which container image(s) are affected
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Suggested fix (if you have one)
We provide security updates only for the main branch and the most recent stable release.
Older releases may receive critical security fixes on a best-effort basis.
Security fixes are released as:
- New :latesttags pointing to patched versions
- Version-specific tags (e.g., :1.2.3) for stable releases
- Updated :edgetags from the main branch
We recommend:
- Use specific version tags (:1.2.3) for production deployments
- Monitor GitHub releases and security advisories
- Test :latestin staging before deploying to production
When using curiOS containers:
- Use specific version tags for reproducibility and control
- Run with minimal privileges - avoid --privilegedunless necessary
- Use read-only root filesystems where possible (--read-only)
- Mount configs as read-only (:rosuffix on volume mounts)
- Keep host systems updated - container security depends on the host
- Monitor for updates - subscribe to GitHub releases
curiOS containers are built on Buildroot, which includes various upstream components. We track security advisories for:
- Buildroot itself
- Linux kernel (for system container)
- Individual packages (nftables, ntpd, BusyBox, etc.)
We appreciate the efforts of the security community to help improve the security of curiOS. Thank you for your responsible disclosure.