| Version | Supported |
|---|---|
| 0.8.x | ✅ |
| 0.7.x | ✅ |
| < 0.7.0 | ❌ |
To report a security vulnerability, please use one of these channels:
- Preferred: GitHub Security Advisory → Report a vulnerability
- Alternative: Email the maintainers directly (do not open a public issue)
- Description of the vulnerability
- Steps to reproduce
- Affected versions
- Any potential mitigations you've identified
- Report received → acknowledgment within 48 hours
- Investigation and fix → typically within 7 days
- Coordinated disclosure with CVE assignment if applicable
- Patch released + advisory published
- No authentication or authorization — that is the embedder's responsibility
- WAL files are written to the local filesystem with OS-level permissions
- Binary codec uses CRC32 checksums for data integrity
- No network listening in core — all network I/O is in
loomq-server
- Token-based authentication via
security.tokensconfig (disabled by default) - HTTP request size limits via
server.max_request_size(default: 10MB) - Connection limiting via
netty.maxConnections(default: 10000) - Semaphore-based concurrent business request limiting via
netty.maxConcurrentBusinessRequests - Netty graceful shutdown with configurable timeout
- Enable token authentication: set
security.enabled=trueand configure tokens - Place LoomQ behind a reverse proxy (nginx/Caddy) for TLS termination
- Restrict WAL data directory to the LoomQ process user only
- Use network policies to restrict access to the replication port (default 9090)
- Set appropriate JVM security manager or use container security contexts