We take security seriously. If you discover a security vulnerability in otlpxy, please report it responsibly.
Please do NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security issues by:
- Emailing us at: [jqyu.lee@gmail.com]
- Or creating a private security advisory on GitHub
When reporting a vulnerability, please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Your contact information
- We will acknowledge receipt within 48 hours
- We will provide a detailed response within 7 days
- We will keep you informed about our progress
- We will notify you when the vulnerability is fixed
- Please allow us reasonable time to fix the issue before public disclosure
- We will credit you in the security advisory (unless you prefer to remain anonymous)
- We will coordinate with you on the disclosure timeline
We provide security updates for:
- The latest release
- The previous major release (if applicable)
When deploying otlpxy:
-
Protect Your Config File
- Never commit
config.tomlwith real credentials - Use environment-specific configs
- Rotate API keys regularly
- Never commit
-
Network Security
- Use HTTPS for all external connections
- Implement proper CORS policies
- Consider rate limiting at the ingress layer
-
Access Control
- Use least-privilege API keys
- Implement authentication if exposing publicly
- Monitor access logs
-
Keep Updated
- Regularly update to the latest version
- Monitor security advisories
- Subscribe to release notifications
- This service accepts and forwards OTLP data - ensure your collector endpoint is trusted
- API keys are passed in Authorization headers - use TLS in production
- CORS is configurable - restrict to trusted origins only
For security-related questions: [jqyu.lee@gmail.com]