If you discover a security vulnerability in any EvalOps repository, please report it responsibly.
Do not open a public GitHub issue for security vulnerabilities.
Instead, email security@evalops.dev with:
- A description of the vulnerability
- Steps to reproduce
- The affected service(s) and version(s)
- Any potential impact assessment
We will acknowledge receipt within 48 hours and provide an initial assessment within 5 business days.
We support security patches for the latest release of each actively maintained service.
This policy applies to all repositories in the evalops GitHub organization.
EvalOps does not use GitHub CodeQL or GitHub default code scanning. Every
repository is attached to the EvalOps security baseline recommended code security
configuration (id=245233), which sets advanced_security: secret_protection and code_scanning_default_setup: disabled, and is the
default for new repositories.
Security signal should come from bounded, owned checks:
semgrep-based custom rules in service repos (see.semgrep/directories and thesemgrep-customworkflows).- Service-specific gates such as
architecture-review,contract-skew-check, andmigration-checkinevalops/platform. - Secret scanning, Dependabot, and targeted repository-owned analyzers with explicit owners and runtime budgets.
Do not add CodeQL workflows, generated default-setup workflows, or required checks backed by blanket code scanning. To request a policy change, open a PR against this file and the engineering-practices contract.