-
-
Notifications
You must be signed in to change notification settings - Fork 7.5k
Description
Context
Uptime Kuma has grown in popularity and complexity, and security considerations increasingly affect feature design (e.g. multi-user support, permissions, monitor capabilities).
Maintainers already handle security topics informally, but we currently lack a shared structure or threat model.
As such, during security issues it is often not clear if something is a security issue or not.
Examples of questions that have been raised:
- Can attackers insert USB devices into the host system?
- Can attackers read from or write to the file system?
- Do attackers have admin-level access to the host?
- Do attackers have admin-level access in uptime kuma?
- Is authenticated server-side request forgery considered in-scope for us?
- Are these open metadata endpoints on google clould an exploit in us or in google cloud?
A clearer shared model would help answer these questions more consistently.
Proposal
I would like to introduce two security-related groups with clearly separated responsibilities:
-
public Uptime Kuma Security Working Group (click to expand)
Purpose
This work is expected to unblock future features (e.g. multi-user support, safer monitor designs) by making it clear what "being secure" means for us and improve our processes.
- Threat modeling and security design discussions
- Improve overall security posture (scorecard, depenedency management, ...)
Membership
- Open to anyone
- No security background required
Typical expectations
- Willingness to learn and discuss security topics
- Constructive participation
- Availability for occasional online meetings
-
private Uptime Kuma Security Triage Team (click to expand)
Purpose
- Handle infrequent private vulnerability reports
- Coordinate fixes, releases, and advisories
- Handle embargoed information
Membership
- By invitation only
Typical requirements
- Maintainer or long-term contributor (this or another project)
- Demonstrated responsible behavior and good judgment
- Ability to handle sensitive / embargoed information
- Demonstrated project involvement (issues, PRs, reviews, etc.)
- Availability during coordinated disclosures
Requirements are guidelines, not strict rules. Trust matters most.
Call to Action
I’d like feedback from other maintainers and the community on this proposal:
- Does this structure make sense for Uptime Kuma?
- Are the scopes and responsibilities clearly defined?
- Are there important security assumptions or threat boundaries we should explicitly document?
- If you’re interested in participating in the Security Working Group, please comment on this issue.
- If you’re a maintainer or long-term contributor and think you might be a good fit for the Security Triage Team, feel free to reach out privately.
The goal here is not to add bureaucracy, but to make security discussions clearer, more consistent, and easier to handle as the project continues to grow.