We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1.0 | ❌ |
We take security seriously. If you discover a security vulnerability, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities
- Email security concerns to: security@serup.ai
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Initial Assessment: We will provide an initial assessment within 7 days
- Resolution Timeline: Critical vulnerabilities will be addressed within 30 days
- Disclosure: We practice coordinated disclosure and will work with you on timing
We do not currently have a formal bug bounty program, but we deeply appreciate security researchers who report vulnerabilities responsibly. Contributors may be acknowledged in our release notes (with permission).
- Static Analysis: CodeQL scans on all pull requests
- Secret Detection: Gitleaks scans to prevent credential leaks
- Dependency Scanning: Dependabot monitors for vulnerable dependencies
- Non-root users in production containers
- Minimal base images (slim/alpine variants)
- Regular base image updates via Dependabot
- All API endpoints require appropriate authentication (when enabled)
- ADB connections are restricted to the internal Docker network
- Redroid containers are isolated with configurable resource limits
- Never expose ADB ports (5555+) to the public internet
- Use a reverse proxy (nginx/traefik) with SSL/TLS
- Enable authentication for the API endpoints
- Restrict network access using firewall rules
- Use secrets management for API keys and credentials
Never commit secrets to the repository. Use environment variables or secrets management:
# Good - Use environment variables
ANTHROPIC_API_KEY=sk-ant-...
DATABASE_URL=postgresql://...
# Bad - Never hardcode in source files# Recommended docker-compose security settings
services:
api:
security_opt:
- no-new-privileges:true
read_only: true
tmpfs:
- /tmpRedroid containers require privileged mode or specific capabilities to function. This is a known requirement of Android emulation. Mitigations:
- Run on dedicated hosts, not shared infrastructure
- Use network isolation between Redroid instances
- Limit container resource usage
ADB provides full device control. Protect ADB access by:
- Never exposing ADB ports externally
- Using Docker network isolation
- Implementing API-level access controls
Security updates are released as patch versions. Subscribe to GitHub releases to be notified of security patches.
Thank you for helping keep MobileDroid and its users safe!