| Version | Supported |
|---|---|
| 0.1.x | Yes |
Do not open a public GitHub issue for security vulnerabilities.
Please report security issues by emailing the maintainer directly via the email address on your GitHub profile, or open a GitHub Security Advisory (private disclosure).
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested mitigations
Expected response time: 72 hours for acknowledgment, 14 days for a fix or mitigation plan.
This is a reference architecture running in Docker containers. Key security considerations:
- Credentials: Default credentials (
admin/admin) are used in the lab inventory. Do not expose lab containers to the public internet. - IPSec PSKs: Terraform outputs IPSec pre-shared keys as sensitive values. Never commit PSKs or
.tfstatefiles to the repository. - AWS OIDC: The Terraform Apply workflow uses OIDC for short-lived credentials. No long-lived AWS keys should ever be stored in repository secrets.
- SNMP: Community string
publicis used in the lab. Change for any production deployment.