| Version | Supported |
|---|---|
| 1.1.x | ✅ |
| 1.0.x | ❌ |
eagle-scout maintains the following security standards:
- Non-root execution - Container runs as user
scout(UID 1001) - Minimal base image - Uses
docker:cliwith only required tools - No secrets in image - All credentials passed at runtime
- Supply chain attestations - SBOM and provenance included
- Critical CVEs - Must be fixed before merge
- High CVEs - Must be fixed before merge (if fix available)
- Medium/Low CVEs - Tracked and fixed in regular updates
All pull requests must pass:
- Docker Scout CVE scan (critical/high with fixes = fail)
- Non-root user check
- SBOM generation
- Provenance attestation
DO NOT open a public issue for security vulnerabilities.
- Email: security@ry-ops.dev (or open a private security advisory on GitHub)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment - Within 48 hours
- Initial Assessment - Within 7 days
- Fix Timeline - Based on severity:
- Critical: 24-48 hours
- High: 7 days
- Medium: 30 days
- Low: Next release
We use Docker Scout for continuous security monitoring:
# Scan for vulnerabilities
docker scout cves ryops/eagle-scout:latest
# Quick overview
docker scout quickview ryops/eagle-scout:latest
# Check policy compliance
docker scout policy ryops/eagle-scout:latestSome vulnerabilities may exist in upstream dependencies that we cannot directly fix:
| Component | Issue | Status | Tracking |
|---|---|---|---|
| docker:cli | Go 1.24.11 stdlib CVE | Waiting on Docker | [docker/docker#xxx] |
We monitor upstream fixes and update promptly when available.
- Fixed 7 Go stdlib CVEs by upgrading to Go 1.25
- Added SBOM attestation
- Added max-mode provenance attestation
- Initial release with non-root user
- Multi-stage build for minimal image