Only the latest stable release of FractalX receives security updates.
| Version | Supported |
|---|---|
| 0.4.x | ✅ |
| < 0.4.0 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in FractalX, report it privately via one of the following channels:
- GitHub Private Vulnerability Reporting: Use the Security Advisories page to submit a report confidentially.
- Email: Contact the maintainer directly at the email address listed on @sathninduk's GitHub profile.
Please include as much of the following as possible:
- A description of the vulnerability and its potential impact
- The affected version(s)
- Steps to reproduce or proof-of-concept
- Any suggested mitigation or fix
You can expect an initial response within 72 hours and a resolution or mitigation plan within 14 days for confirmed vulnerabilities.
Security reports are accepted for the following components:
fractalx-core— static analysis and code generation enginefractalx-maven-plugin— Maven plugin mojosfractalx-runtime— runtime library bundled into generated servicesfractalx-annotations— compile-time annotationsfractalx-initializr-core— project initialisation core
- Vulnerabilities in generated output code that arise from insecure patterns in the user's own monolith source (FractalX mirrors what it finds)
- Third-party dependencies — please report those upstream
- Issues in sample/demo projects
FractalX generates microservice source code that ships with opinionated defaults. Before deploying generated services to production, review the following:
- Auth service: The generated
AuthServiceuses JWT with a default JWKS URI placeholder — replace with your Identity Provider before deployment. - Internal tokens: Inter-service calls are authenticated with short-lived internal tokens minted by the gateway — ensure
INTERNAL_TOKEN_SECRETis set to a strong secret in production. - CORS: Default allowed origins include
localhost— updatefractalx.corsAllowedOriginsinfractalx-config.ymlfor production. - Actuator endpoints: Generated services expose
/actuator/healthand/actuator/metrics— restrict access at the gateway or firewall level. - Secrets in config: Never commit
fractalx-config.ymlcontaining real credentials — use environment variable substitution or a secrets manager.
We follow a coordinated disclosure model. Once a fix is available, we will:
- Release a patched version
- Publish a GitHub Security Advisory with full details
- Credit the reporter (unless they prefer to remain anonymous)