| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in @dcyfr/ai-docker, please report it responsibly.
Do NOT open a public issue for security vulnerabilities.
- Email: Send details to hello@dcyfr.ai with subject line
[SECURITY] dcyfr-ai-docker - Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Assessment: Within 5 business days
- Fix/Patch: Within 30 days for critical issues
This template generates Docker configurations that follow security best practices:
- Non-root user — Containers run as unprivileged
dcyfruser - Multi-stage builds — Minimal production images without build tools
- No secrets in images — Environment variables used for sensitive values
- Health checks — Built-in container health monitoring
- Read-only root filesystem — Production configs restrict write access
- Pinned versions — No
:latesttags; use specific version tags - Alpine base — Minimal attack surface with Alpine Linux
- No ADD instruction — COPY used instead of ADD for predictability
- Cache cleaning —
npm cache clean --forcein every install layer
The built-in validator checks for 10 security rules:
- No root user in production
- No
:latestimage tags - Health check present
- Multi-stage builds used
- No ADD instruction (use COPY)
- Package versions pinned
- No secrets in environment
npm ciused (notnpm install)- Package cache cleaned
- WORKDIR set
- Production compose uses isolated bridge networks
- No unnecessary port exposure in production services
- Nginx reverse proxy with security headers and rate limiting
This project has minimal dependencies:
zod— Runtime schema validation (no known vulnerabilities)
All dependencies are audited with npm audit as part of CI/CD.