Please report any security issues you discovered in a recipe to [email protected].
We will assess the risk, plus make a fix available before we create a GitHub issue.
In case the vulnerability is into a dependency, please refer to their security policy directly.
Thank you for your contribution.
To refer to this repository using a CPE v2.3, please use cpe:2.3:a:ctfer-io:recipes:*:*:*:*:*:*:*:*.
This mostly contains the runner.go file.
You could decline for each scenario, if required, using the following rule:
- an
environmentmust be selected in the root directory ; - a
recipemust be selected from theenvironment. Then you can usecpe:2.3:a:ctfer-io:recipes-<environment>-<recipe>:*:*:*:*:*:*:*:*.
For instance, with the chall-manager environment and kubernetes.ExposedMonopod recipe, you end up with cpe:2.3:a:ctfer-io:recipes-chall-manager-kubernetes.ExposedMonopod:*:*:*:*:*:*:*:*.
A security analyst could capture all refinement with cpe:2.3:a:ctfer-io:recipes*:*:*:*:*:*:*:*:*.
Use with the version set to the tag you are using.