This security policy covers vulnerabilities in the Docker image packaging (Dockerfile, CI/CD, container configuration). For vulnerabilities in phpbu itself, please report to the upstream phpbu project.
We take security vulnerabilities seriously. If you discover a security issue in the container image, please report it responsibly.
- Do NOT create a public GitHub issue for security vulnerabilities
- Use GitHub Security Advisories to report privately
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
flowchart LR
A[Report] --> B[Acknowledge]
B --> C[Assess]
C --> D[Fix]
D --> E[Test]
E --> F[Disclose]
F --> G[Credit]
- Acknowledgment of your report
- Assessment of severity and impact
- Development and testing of fix
- Coordinated disclosure
- Credit in release notes (if desired)
This project implements the following security practices:
- Non-root user execution (UID 1000)
- Minimal Alpine-based image
- Multi-stage builds (no build tools in production)
- Daily vulnerability scanning with Trivy
- No secrets in image layers
- Signed images with Cosign (keyless OIDC)
- SBOM generation for dependency tracking
- SLSA Build Level 3 provenance attestation
- Dependabot for automated dependency updates
- Gitleaks scanning for secrets
- Pinned base images
- Composer dependencies from official sources
- Read-only filesystem support
- Security-opt no-new-privileges
# Verify image signature
cosign verify ghcr.io/netresearch/phpbu-docker:latest \
--certificate-identity-regexp "https://github.com/netresearch/phpbu-docker" \
--certificate-oidc-issuer "https://token.actions.githubusercontent.com"
# Download and verify SBOM
cosign download sbom ghcr.io/netresearch/phpbu-docker:latest > sbom.spdx.jsonReport vulnerabilities via GitHub Security Advisories.