Skip to content

Security: elide-dev/elide

.github/SECURITY.md

Security Policy: Elide Project

Version: 1.0

The Elide project and team take security very seriously; a big point of Elide's existence is a lack of isolation in other runtimes.

Security issues are addressed promptly, and we continuously enhance project security where at all possible.

Supported Versions

The Elide project is still early, but we intend to support the latest release and immediate past release. Once the project hits a level of stability suitable for a 1.0 version we will update this document and issue an LTS release.

Current version support matrix:

Version Supported
v3-alpha4-*
v3-alpha3-* ✅ (Immediate past release)
v2 and before ❌ No support (ancient)

Reporting a Vulnerability

We use GitHub issues to track vulnerabilities. Click here to report a new issue. If you need to report a vulnerability privately, please use the email address on our main GitHub organization page (apps at elide dot cloud).

If you need to provide secure information or your report needs to be encrypted, please use our PGP key, as listed on public key servers at the same email address.

The Elide team will respond to vulnerabilities promptly. We will work with you to understand the scope of the issue and confirm the vulnerability.

Once confirmed, we will work to address the issue and release a patch as soon as possible, including backporting to the latest release and immediate past release.

Other (older) releases may receive backports on a case-by-case basis.

Security Advisories

We will publish security advisories for any vulnerabilities that we address.

These advisories will be published on our GitHub organization page and will be linked to from this document; the main elide repository will also have a link to this document.

At this time, no security advisories have been announced.

Supply Chain Security

Elide leverages dependency verification and dependency locking for all supported tooling; in any case, we select the minimum set of high-quality dependencies necessary to deliver a feature.

In most cases, Elide only depends on standard libraries and language-endorsed extensions.

Dependency Verification and Locking

Elide employs Gradle for dependency assurance, with SHA-256 and PGP used for hashing and signing.

Attestations and Signing

Elide ships with SLSA attestations for all modules, and embeds an SBOM with each binary artifact. Library releases are signed with PGP and published to Maven Central; all releases are additionally registered with Sigstore.

Container image bases carry SLSA attestations and are registered with Sigstore.

Continuous Updates

Elide pins to the latest versions of all dependencies, by default, modulo (1) known vulnerabilities and (2) support for current features. Every attempt is made to use only stable dependencies; sometimes this is not possible with the speed at which development occurs on Elide.

Elide employs Dependabot and Renovate for automated dependency updates, and we continuously monitor for and adopt new releases of all software Elide depends on.

Upstream Policies

Elide is a meta-framework and runtime.

When used as a library or framework, the bulk of Elide's functionality is implemented by Micronaut and Netty. When used as a runtime, Elide is built on top of GraalVM.

You can find their security policies here (Micronaut), here (Netty), and here (GraalVM), respectively.

There aren’t any published security advisories