We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
Please do not create a public GitHub issue for security vulnerabilities, as this could put users at risk.
Report security vulnerabilities through one of these methods:
- GitHub Security Advisories: Use the Security Advisories page (preferred)
- Email: Contact the maintainers privately
Include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggested fixes (if available)
- Your contact information
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 1-7 days
- High: 7-30 days
- Medium/Low: 30-90 days
This project implements several security measures:
- CodeQL: Continuous security analysis of code
- Dependabot: Automated dependency vulnerability scanning
- Trivy: Container image vulnerability scanning
- SBOM: Software Bill of Materials generation
- Gradle Wrapper Validation: Ensures integrity of build scripts
- Dependency Verification: Checks for known vulnerabilities
- Eclipse Temurin: Uses trusted OpenJDK distribution
- Multi-stage Docker Builds: Minimizes attack surface
- Non-root Containers: Docker images run as unprivileged user
- Minimal Base Images: Alpine Linux for smaller attack surface
- RCON Password Protection: Secure remote administration
- Network Isolation: Proper Docker network configuration
When using this project, we recommend:
-
Change Default Passwords
- Update RCON password in
server.properties - Use strong, unique passwords
- Update RCON password in
-
Enable Whitelist
- Use whitelist mode for private servers
- Regularly review player permissions
-
Regular Updates
- Keep Paper server updated
- Update plugins regularly
- Apply security patches promptly
-
Network Security
- Use firewall rules to restrict access
- Consider using a reverse proxy
- Enable DDoS protection if needed
-
Input Validation
- Validate all player input
- Sanitize user-generated content
- Use parameterized queries
-
Permission Checks
- Always verify permissions before actions
- Follow principle of least privilege
- Use Paper's permission system
-
Dependency Management
- Keep dependencies updated
- Review dependency security advisories
- Use dependency verification
-
Code Review
- Review all code changes
- Use automated security scanning
- Follow secure coding practices
- Minecraft servers are inherently exposed to network traffic
- Players can potentially exploit game mechanics
- Mods and plugins can introduce vulnerabilities
- Use Paper instead of vanilla Minecraft for better security
- Regular Backups to recover from incidents
- Monitor Logs for suspicious activity
- Rate Limiting to prevent abuse
- Player Reporting system for moderation
Security updates are released as:
- Patch Releases: For security fixes (e.g., 1.0.1)
- Security Advisories: Published on GitHub
- Release Notes: Include security fix details
Subscribe to repository releases to stay informed.
We appreciate responsible disclosure and will acknowledge security researchers who report vulnerabilities (unless they prefer to remain anonymous).
For security-related questions that are not vulnerabilities, please:
- Check existing Discussions
- Review the documentation
- Open a new discussion (not an issue) for questions
Thank you for helping keep this project secure! 🔒