Security Policy

How to Report Potential Security Vulnerabilities

If you discover any potential security vulnerabilities in the http4k ecosystem, please report them through GitHub’s private vulnerability reporting feature.

Viewing Security Vulnerabilities

All identified and resolved security vulnerabilities will be made available publicly at https://http4k.org/security/.

Guidelines for Reporting a Vulnerability

If you think you’ve found a security vulnerability in http4k, please follow the process described above. Below are some examples to help clarify what might be considered a vulnerability and what is typically not.

Examples of Vulnerabilities

For specific examples of vulnerabilities, refer to our dedicated security page at https://http4k.org/security/.

Examples of Non-Vulnerabilities

Unsafe Deserialization

In the context of http4k, deserialization itself is not considered a security vulnerability unless http4k passes data from an untrusted source (such as HTTP parameters) into a deserialization method in a way that results in a security issue, like a CVE. While deserialization of arbitrary types is necessary in many applications, it must be done securely, and it is up to developers to ensure that this process is safe within their own codebases.

Vulnerabilities in Dependencies

If you discover vulnerabilities in http4k’s dependencies, these should be reported directly to the respective project maintainers.

Vulnerable Dependency Versions

The http4k team strives to keep dependencies updated, even if a specific version has no vulnerabilities. However, we do not consider the inclusion of a vulnerable dependency in http4k itself to be a vulnerability, as developers are free to override dependency versions. It’s the responsibility of the dependency maintainers to release updates with security patches, and we will incorporate these changes in subsequent http4k releases.

pumb