Please do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.
Instead, report them privately using GitHub's Private Vulnerability Reporting:
- Open https://github.com/Soju06/codex-lb/security/advisories/new
- Fill in a clear title and a detailed description of the issue.
- Include reproduction steps, affected versions, and any proof-of-concept you have.
- Submit. The report is visible only to repository maintainers.
If for some reason you cannot use the private advisory flow, you may instead
contact the maintainer via the email address listed in
CODE_OF_CONDUCT.md, with a subject line starting with
[codex-lb security].
A good report makes triage much faster:
- Affected version(s): e.g.
codex-lb 1.16.0, ghcr image digest, or commit SHA. - Deployment: uvx / pip / Docker / Helm / from source.
- Impact: what can an attacker do? (data disclosure, account takeover, RCE, DoS, auth bypass, log injection, etc.)
- Reproduction: minimal steps — config snippet, request payload, log excerpt. Redact your own secrets before sending.
- Suggested fix (optional): if you already have a patch in mind.
In scope:
- The codex-lb proxy (
app/) — auth, routing, account management, the dashboard backend, the/v1/*and/backend-api/*surfaces. - The dashboard frontend (
frontend/). - The published Docker image (
ghcr.io/Soju06/codex-lb) and Helm chart (oci://ghcr.io/soju06/charts/codex-lb). - Released PyPI artifacts (
codex-lbon PyPI).
Out of scope (please don't file these as security advisories):
- Issues in upstream services (ChatGPT, OpenAI Codex, model providers).
- Vulnerabilities in third-party dependencies that don't reach codex-lb's attack surface — file those upstream.
- Self-inflicted misconfiguration (exposing the dashboard publicly without
auth, leaking your own API keys via committed
.env, etc.). - Findings on outdated releases (older than the latest two minor versions) unless they affect supported versions too.
- Acknowledge — maintainer confirms receipt within 3 business days.
- Triage & validate — within 7 business days the maintainer either confirms the issue, asks for more information, or declines with reasoning.
- Fix & coordinate — for confirmed issues, the maintainer drafts a fix privately. We aim to ship a patched release within 30 days of confirmation; severe issues are prioritized.
- Release & advisory — once the patched release is published, the maintainer publishes a GitHub Security Advisory (with a CVE if applicable) crediting you, unless you request anonymity.
- Embargo — please do not publicly disclose the issue until the advisory is published. We will not sit on a confirmed vulnerability indefinitely; if 30 days pass without a fix, we'll agree on a coordinated disclosure date with you.
Security fixes are issued for the latest minor release and the previous minor release on a best-effort basis. Older versions may not receive backports — please upgrade.
| Version | Supported |
|---|---|
| 1.17.x | ✅ active |
| 1.16.x | ✅ critical fixes |
| < 1.16 | ❌ upgrade required |
We're happy to credit reporters in the published advisory and (with permission) in this section. Researchers who responsibly disclose a confirmed vulnerability will be acknowledged here.
(none yet — be the first.)