Skip to content

Security: evalops/template-go-service

SECURITY.md

Security Policy

Reporting a Vulnerability

If you discover a security vulnerability in any EvalOps repository, please report it responsibly.

Do not open a public GitHub issue for security vulnerabilities.

Instead, email security@evalops.dev with:

  • A description of the vulnerability
  • Steps to reproduce
  • The affected service(s) and version(s)
  • Any potential impact assessment

We will acknowledge receipt within 48 hours and provide an initial assessment within 5 business days.

Supported Versions

We support security patches for the latest release of each actively maintained service.

Scope

This policy applies to all repositories in the evalops GitHub organization.

Code Scanning

EvalOps does not use GitHub CodeQL or GitHub default code scanning. Every repository is attached to the EvalOps security baseline recommended code security configuration (id=245233), which sets advanced_security: secret_protection and code_scanning_default_setup: disabled, and is the default for new repositories.

Security signal should come from bounded, owned checks:

  • semgrep-based custom rules in service repos (see .semgrep/ directories and the semgrep-custom workflows).
  • Service-specific gates such as architecture-review, contract-skew-check, and migration-check in evalops/platform.
  • Secret scanning, Dependabot, and targeted repository-owned analyzers with explicit owners and runtime budgets.

Do not add CodeQL workflows, generated default-setup workflows, or required checks backed by blanket code scanning. To request a policy change, open a PR against this file and the engineering-practices contract.

There aren't any published security advisories