physical-ai-toolchain

[!NOTE] This guide expands on the Security Review Process section of the main contributing guide.

Security-sensitive contributions require additional review to ensure Azure security best practices.

Security Checklist

Contributions touching these areas require security review:

RBAC and Permissions

Private Endpoints and Networking

Credentials and Secrets

Network Policies

Workload Identity

Security Scanning

How to Report Security Issues

[!WARNING] DO NOT report security vulnerabilities through public GitHub issues.

Report security vulnerabilities to the Microsoft Security Response Center (MSRC). See SECURITY.md for complete instructions.

For non-security bugs that have security implications (e.g., excessive permissions), use the standard bug reporting process but add the security label.

Dependency Updates

Security patch PRs are encouraged and receive expedited review:

Security Update Process

  1. Create PR with dependency version bump
  2. Document CVE or security advisory addressed
  3. Provide validation evidence (vulnerability scan before/after)
  4. Maintainers fast-track review and merge

Example PR Description

## Security Update: Upgrade Terraform AzureRM Provider

**CVE:** CVE-2024-XXXXX
**Severity:** High
**Advisory:** https://github.com/advisories/GHSA-xxxx-xxxx-xxxx

**Changes:**
- Upgraded `azurerm` provider from 3.75.0 to 3.76.0
- Addresses authentication bypass vulnerability in private endpoint configurations

**Validation:**
- terraform fmt/validate: ✅ Passed
- terraform plan: ✅ No unexpected changes
- Checkov scan: ✅ No new violations

**References:**
- [Provider Changelog](https://github.com/hashicorp/terraform-provider-azurerm/blob/main/CHANGELOG.md)