Skip to content

Security Policy

Reporting a Vulnerability

This is a hobby project maintained by a single person. If you discover a security vulnerability in quadletman, you may report it, but there is no guarantee of it being fixed.

Do not open a public GitHub issue for security vulnerabilities.

Please use GitHub's private vulnerability reporting.

Include: - A description of the vulnerability - Steps to reproduce - The potential impact - Any suggested fix (optional)

Supported Versions

This is a side project maintained by a single developer. There are no official supported versions. See also LICENSE.

Security Model

quadletman runs as a dedicated quadletman system user (or root for legacy installations) and manages Podman containers via per-compartment Linux users. Admin operations escalate via the authenticated user's sudo credentials.

Key security controls: - PAM-based authentication restricted to sudo/wheel group members - Branded-type input validation at every layer boundary - Session credentials stored in the Linux kernel keyring (when available) - CSRF protection via double-submit cookie - CSP headers blocking all external resource loading - All host mutations routed through audited wrappers