Below are the versions of the OpenTelemetry SDK for Dart that are currently supported with security updates:
| Version | Supported |
|---|---|
| 0.8.x | ✅ |
| < 0.8.0 | ❌ |
We take the security of OpenTelemetry SDK for Dart seriously. If you believe you have found a security vulnerability, please follow these steps:
- Do not disclose the vulnerability publicly
- Contact the maintainers privately - Email [email protected] with details of the vulnerability
- Provide sufficient information to reproduce the issue, including:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested mitigation if available
After you report a vulnerability:
- Acknowledgment - You will receive acknowledgment of your report within 48 hours
- Verification - Our team will work to verify the vulnerability
- Remediation Plan - We will develop a plan to address the vulnerability
- Public Disclosure - Once a fix is available, we will coordinate with you on public disclosure
When using OpenTelemetry SDK for Dart:
- Keep the package updated to the latest supported version
- Review your telemetry data to ensure sensitive information is not inadvertently collected
- Apply appropriate access controls to your telemetry data collection endpoints
- Consider using TLS for all telemetry data transmission
- Implement appropriate sampling strategies to limit the volume of data collected
- Configure span processors to handle data securely
- Use secure connections for exporters that transmit data over the network
When implementing OpenTelemetry:
- Data Minimization - Only collect the telemetry data necessary for your use case
- PII Protection - Avoid including personally identifiable information in spans or metrics
- Sensitive Data - Avoid including sensitive information such as authentication tokens in attributes
- Network Security - Use secure connections (TLS) when exporting telemetry data
- Authentication - Consider using authentication for your OpenTelemetry Collector endpoints
- Access Control - Implement appropriate access controls for your telemetry data
- Sanitization - Consider implementing sanitization for sensitive attributes
- Sampling - Use sampling to reduce the volume of potentially sensitive data
- Exporters: Configure exporters to use secure connections (e.g., HTTPS, gRPC with TLS)
- Resource Attributes: Be cautious about automatically adding host or environment information that might expose sensitive details
- Batch Processing: Configure batch processors with appropriate queue sizes and timeouts to prevent memory exhaustion
- Error Handling: Ensure that error handling in span processors doesn't leak sensitive information
- Configuration: Securely manage any API keys or authentication tokens used in exporter configurations
Our disclosure policy is:
- Security issues will be announced via GitHub security advisories
- CVEs will be requested when appropriate
- Fixed versions will be clearly identified in release notes
- Security patches will be prioritized over feature development