We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of the GDAL EOPF-Zarr Plugin seriously. If you discover a security vulnerability, please follow these steps:
Security vulnerabilities should be reported privately to protect users until a fix is available.
- Go to the Security tab of this repository
- Click "Report a vulnerability"
- Fill out the security advisory form with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if known)
If GitHub Security Advisories are not available, you can email the maintainers at:
- Primary Contact: [security@eopf-sample-service.org]
- Include "[SECURITY]" in the subject line
When reporting a vulnerability, please include:
- Description: Clear description of the vulnerability
- Location: File/function/line where the issue exists
- Impact: What an attacker could achieve
- Reproduction: Step-by-step instructions to reproduce
- Fix Suggestion: If you have ideas for fixing (optional)
- CVE Information: If already assigned (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 5 business days
- Status Updates: Weekly until resolved
- Fix Timeline: Depends on severity
- Critical: 7 days
- High: 30 days
- Medium: 90 days
- Low: Next minor release
When using the GDAL EOPF-Zarr Plugin:
- Always validate file paths and URLs
- Use GDAL's virtual file system (VSI) for network access
- Implement proper error handling for malformed data
- Use HTTPS when accessing remote Zarr datasets
- Validate SSL certificates in production
- Consider network timeouts for remote data access
- The plugin handles large datasets - monitor memory usage
- Use GDAL's chunked reading for large files
- Implement proper cleanup in error paths
- The plugin can access HTTP/HTTPS URLs
- Ensure network security policies are in place
- Consider firewall rules for outbound connections
- Memory exhaustion possible with very large datasets
- Implement appropriate limits in production environments
- JSON metadata is parsed from Zarr files
- Malformed metadata could cause parsing issues
- Input validation is implemented but should be monitored
Security updates will be:
- Released as patch versions (e.g., 1.0.1, 1.0.2)
- Documented in CHANGELOG.md with security advisory references
- Announced via GitHub releases with security labels
- Published to relevant security databases (CVE, GitHub Security Advisories)
For general security questions (not vulnerabilities):
- GitHub Discussions: Security category
- GitHub Issues: Use the "security" label for non-sensitive questions
For urgent security matters:
- GitHub Security Advisories: Report a vulnerability
This security policy is based on industry best practices and will be updated as needed.