We release patches for security vulnerabilities for the following versions:
Version | Supported |
---|---|
Latest release | ✅ |
Previous minor release | ✅ |
Older than previous minor release | ❌ |
We take the security of the Terraform Provider for Proxmox and its users seriously. If you believe you have found a security vulnerability, please report it to us privately.
Please do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.
Instead, please send an email to [email protected] or report it through GitHub's Security Advisory feature:
- Go to https://github.com/bpg/terraform-provider-proxmox/security/advisories/new
- Provide a descriptive title
- Fill in a detailed description of the issue
- Click "Submit report"
Please include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Suggested fix if possible
- Your name/handle for credit (optional)
When you submit a vulnerability report, you can expect:
- Acknowledgment of your report within 48 hours
- Regular updates about our progress
- Credit for discovering the vulnerability (if desired)
When we receive a security bug report, we will:
- Confirm the problem and determine the affected versions
- Audit code to find any potential similar problems
- Prepare fixes for all supported versions
- Release new versions and notify users
When using this provider, please follow these security best practices:
-
API Credentials:
- Use environment variables or encrypted credential files to store sensitive information
- Never commit API tokens or credentials to version control
- Use the most restrictive permissions possible for API users
-
Network Security:
- Use HTTPS/TLS for all API connections
- Configure appropriate firewall rules
- Use private networks where possible
-
State File Security:
- Encrypt your Terraform state files
- Use remote state with appropriate access controls
- Be cautious with state file contents as they may contain sensitive information
For more information about security practices when using this provider, please refer to: