Security

Jigsaw delegates authentication to Keycloak, encrypts panel sessions, and isolates site workloads in Docker. The panel needs access to the Docker socket — treat the host accordingly.

Report a vulnerability

Do not file public issues for unfixed security bugs. Use GitHub private vulnerability reporting or email maintainers as described in SECURITY.md.

Authentication and sessions

Network isolation

Secrets

Docker socket

The panel container mounts the Docker socket to orchestrate customer workloads. That is effectively privileged. Mitigations in code include labelling resources and scoping prune operations; for high-security deployments consider a socket proxy. See SECURITY.md for details.

← Home