Related: docs/security/security-review-plan.md
Overview
The tracker demo is a public internet-facing deployment that exposes multiple
entry points, including HTTPS services, UDP tracker endpoints, SSH, and public
Grafana dashboards. The repository already documents infrastructure,
post-deployment steps, monitoring, and operational issues, but it does not yet
have a dedicated, repeatable security review process focused on realistic attack
paths to initial access.
We need a maintained security review plan that can be reused periodically,
rather than a one-off note or an ad hoc checklist. The plan should make it easy
to reassess the same deployment over time, especially after infrastructure,
networking, authentication, or application changes.
The review should answer a practical question:
How could an external attacker obtain meaningful access to the demo server or
its deployed services?
For this demo, meaningful access includes host access, privileged container
access, access to admin or sensitive application functionality, or access to
secrets and persistent state.
Why This Is Needed
- The deployment is intentionally public and should be reviewed as an attacker
would see it.
- Security assumptions are currently spread across multiple files and are not
organized into a recurring review workflow.
- Changes to Docker networking, reverse proxy routing, Grafana exposure,
tracker API behavior, firewall rules, or image versions can change the attack
surface over time.
- A reusable plan lowers the cost of future reviews and makes the review scope
explicit for contributors.
Proposed Deliverable
Add a dedicated security review planning document under docs/security/ that
defines:
- The review goal and scope.
- The review cadence.
- The current deployment surfaces that must always be reviewed.
- A phased review method covering configuration, source code, runtime
validation, and supply-chain review.
- A recurring checklist for future review cycles.
- An evidence request template listing the exact runtime and source information
needed for each review.
- The expected output of each review cycle.
The document should be written as an operational reference, not as a single
incident note.
Implementation Plan
Acceptance Criteria
Notes
This issue covers the creation of the review plan itself. Actual security review
execution, findings, and follow-up fixes should be tracked in separate issue
documents or dated review notes that reference the plan.
Related: docs/security/security-review-plan.md
Overview
The tracker demo is a public internet-facing deployment that exposes multiple
entry points, including HTTPS services, UDP tracker endpoints, SSH, and public
Grafana dashboards. The repository already documents infrastructure,
post-deployment steps, monitoring, and operational issues, but it does not yet
have a dedicated, repeatable security review process focused on realistic attack
paths to initial access.
We need a maintained security review plan that can be reused periodically,
rather than a one-off note or an ad hoc checklist. The plan should make it easy
to reassess the same deployment over time, especially after infrastructure,
networking, authentication, or application changes.
The review should answer a practical question:
For this demo, meaningful access includes host access, privileged container
access, access to admin or sensitive application functionality, or access to
secrets and persistent state.
Why This Is Needed
would see it.
organized into a recurring review workflow.
tracker API behavior, firewall rules, or image versions can change the attack
surface over time.
explicit for contributors.
Proposed Deliverable
Add a dedicated security review planning document under
docs/security/thatdefines:
validation, and supply-chain review.
needed for each review.
The document should be written as an operational reference, not as a single
incident note.
Implementation Plan
docs/security/security-review-plan.md.visible in the demo deployment.
review, host and container hardening, and supply-chain review.
source repositories.
project-words.txt.Acceptance Criteria
docs/security/security-review-plan.md.process document.
evidence request template.
Notes
This issue covers the creation of the review plan itself. Actual security review
execution, findings, and follow-up fixes should be tracked in separate issue
documents or dated review notes that reference the plan.