Please do not file a public issue for security reports. Instead, email security@spice.ai with:
- A description of the issue and its impact.
- Reproduction steps or a proof-of-concept.
- Any suggested mitigations.
We aim to acknowledge reports within two business days and to provide a remediation plan within ten business days.
client-secretand any values supplied via thesecretsinput are added to the runner's secret-mask list (::add-mask::) before any external request is made. They will not appear in action logs.- The OAuth access token returned by
https://spice.ai/api/oauth/tokenis masked at the moment it is received and never written to outputs or the step summary. - The app's runtime API key (fetched after a successful deploy when smoke tests are enabled) is masked the moment it is read; it is not written to action outputs.
- The action communicates only with the URLs configured by
oauth-token-url,api-url, and the derived/overriddenruntime-url. All requests are HTTPS by default.
We support the latest minor of the most recent major (v1.x). Older majors receive critical security fixes only when the upstream Spice Cloud API constraints allow.