| Version | Supported |
|---|---|
| 2.x | Yes |
| 1.x | No |
If you discover a security vulnerability in MoniGo, please report it responsibly:
- Do not open a public GitHub issue
- Email
iyashjayesh@gmail.comwith:- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
You should receive a response within 48 hours. We will work with you to understand the issue and coordinate disclosure.
MoniGo exposes a dashboard and API endpoints. When deploying in production:
- Always use HTTPS - MoniGo does not enforce TLS; deploy behind a TLS-terminating reverse proxy
- Enable authentication - Use
BasicAuthMiddleware,APIKeyMiddleware, or a customAuthFunction - Restrict network access - Bind the dashboard to internal interfaces or use
IPWhitelistMiddleware - Trusted proxy requirement -
X-Forwarded-Forheaders are trusted by default; only deploy behind a trusted reverse proxy when using IP-based access control - OTel transport - The OTel exporter defaults to insecure gRPC; configure TLS for production collectors
- The
ViewFunctionMetricsendpoint executesgo tool pprofwith user-provided function names. Whileexec.Commanddoes not invoke a shell, function names should be validated against known traced functions. - Rate limiting is per-process, in-memory only. It does not provide distributed rate limiting.