Currently, the following versions of Keycloak Configuration Drive (kcd) are supported with security updates:
| Version | Status |
|---|---|
| 2603.x | ✅ Supported |
If you discover a potential security vulnerability in kcd, please do not open a public issue. Instead, report it privately to the maintainers:
- Fabio Falcinelli: fabio.falcinelli@gmail.com
We aim to acknowledge receipt of your report as soon as possible (typically within a few business days). Please note that while we take security seriously, we are a community-maintained project and cannot guarantee a specific resolution timeframe. We will provide updates as we investigate the issue and work toward a fix.
To help us address the issue quickly, please include:
- A clear description of the vulnerability.
- A minimal reproducible example (PoC) if possible.
- Any potential impact or exploitation scenarios.
kcd interacts with the Keycloak Admin API and manages sensitive configuration data. To ensure your usage remains secure:
- Principle of Least Privilege: Ensure that the Keycloak client or user credentials used by
kcdonly have the minimum necessary permissions to manage the target realm. - Secret Management:
kcdautomatically masks detected secrets in local YAML configurations and stores them in a separate.secretsfile. Do not commit.secretsfiles to version control. - Environment Variables: Protect environment variables containing Keycloak credentials (e.g.,
KEYCLOAK_CLIENT_SECRET) used bykcd. - Keep kcd Updated: Ensure you are using the latest version of
kcdto benefit from upstream security fixes.
We follow a responsible disclosure policy:
- Acknowledge the report.
- Investigate and confirm the vulnerability.
- Work on a fix.
- Release a new version with the fix.
- Publicly disclose the vulnerability (e.g., via GitHub Security Advisories) after a fix is available and users have had time to update.