We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| 1.2.x | ✅ |
| 1.1.x | ✅ |
| 1.0.x | ❌ |
| < 1.0 | ❌ |
We take the security of RedisKit seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Open a public GitHub issue
- Post about it publicly on social media
- Exploit the vulnerability in production environments
- Create a GitHub Security Advisory (preferred): Go to Security → Advisories → Report a vulnerability
- Or contact the maintainer through GitHub issues (for non-critical issues)
- Include the following information:
- Type of vulnerability (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the vulnerability
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- We will acknowledge your email within 48 hours
- We will confirm the vulnerability and determine its impact within 7 days
- We will release a fix as soon as possible, depending on complexity
- We will credit you in the security advisory (unless you prefer to remain anonymous)
When we release a security update:
- We will create a GitHub Security Advisory
- We will release a new version with the fix
- We will update the NuGet package
- We will notify users through GitHub and our communication channels
This project uses multiple automated security tools:
- Dependabot: Automatically creates pull requests for security updates in dependencies
- Qodana Code Quality: Continuous code quality and security analysis with 1,168+ inspection rules
- GitHub Security Advisories: Automatic vulnerability detection in dependencies
- StackExchange.Redis: Core Redis client library
- MessagePack: High-performance serialization
- System.Text.Json: JSON serialization
- Microsoft.Extensions.*: .NET platform extensions
We regularly review and update our dependencies to ensure they are secure and up-to-date.
When using RedisKit in production:
- Always use the latest version: Security patches are only provided for supported versions
- Use secure connections: Always use SSL/TLS when connecting to Redis in production
- Validate input: Always validate and sanitize user input before storing in Redis
- Use authentication: Always use Redis AUTH in production environments
- Limit access: Use Redis ACLs to limit access to specific commands and keys
- Monitor logs: Regularly monitor Redis and application logs for suspicious activity
- Keep Redis updated: Ensure your Redis server is running a supported, secure version
RedisKit includes several security features:
- Connection string sanitization: Passwords are never logged
- Secure serialization: Protection against deserialization attacks
- Input validation: All inputs are validated before processing
- Circuit breaker: Prevents cascade failures and potential DoS
- Rate limiting support: Can be configured to prevent abuse
- Secure defaults: Secure settings are enabled by default
For security vulnerabilities: Create a GitHub Security Advisory
For general questions: Open a GitHub issue
We would like to thank the following individuals for responsibly disclosing security issues: