Skip to content

Security

VersionSupported
Latest release
Previous minor
Older versions
  1. Do not open a public issue

  2. Contact privately

    Email the maintainer directly or use GitHub’s private vulnerability reporting feature.

  3. Include details

    • Description of the vulnerability
    • Steps to reproduce
    • Potential impact
    • Suggested fix (if any)

We aim to respond within 48 hours and will work with you to understand and address the issue.

  • Use a dedicated user with minimal permissions (only api, read, write policies)
  • Use TLS when possible (mikrotik.tls: true)
  • Store credentials securely (environment variables or secrets management)
  • Never commit credentials to version control
  • Use TLS certificates for LAPI connections when available
  • Restrict LAPI access to trusted networks
  • Rotate bouncer API keys periodically
  • The official Docker image runs as a non-root user
  • Use read-only filesystem mount where possible
  • Limit container capabilities
  • Use secrets management for credentials (Docker secrets, Kubernetes secrets)
  • The bouncer identifies its rules by structured comments — do not modify these comments manually
  • Use the comment_prefix option to avoid conflicts with other tools
  • The bouncer performs cleanup on startup and shutdown to prevent stale rules