| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| 1.0.x | ✅ |
| 0.x.x | ❌ |
Our Docker images are built with security best practices:
- Multi-stage builds - Minimal attack surface with only production dependencies
- Non-root user - Container runs as unprivileged
appuser (UID 1001) - Alpine base - Minimal base image with regular security updates
- npm updates - npm upgraded to latest in image to patch bundled dependency CVEs
- SBOM generation - Software Bill of Materials included with each image
- Provenance attestation - Supply chain attestations for image verification
When connecting to MySQL Router's REST API with self-signed certificates, set MYSQL_ROUTER_INSECURE=true. This temporarily disables TLS certificate validation for Router API requests only.
⚠️ CAUTION: This bypasses certificate validation and is vulnerable to man-in-the-middle attacks. Only use in development/testing environments with trusted networks.
- Docker Scout - CVE scanning on every build
- CodeQL - Static analysis for code vulnerabilities
- Dependabot - Automated dependency updates
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
- DO NOT create a public GitHub issue
- Email security concerns to: admin@adamic.tech
- Include detailed reproduction steps
- Allow reasonable time for a fix before public disclosure
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggested fixes (optional)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
We appreciate responsible disclosure and will acknowledge your contribution in our release notes (unless you prefer to remain anonymous).