Coder and the code-server team want to keep the code-server project secure and safe for end-users.


We use the following tools to help us stay on top of vulnerability mitigation.

  • dependabot
    • Submits pull requests to upgrade dependencies. We use dependabot's version upgrades as well as security updates.
  • code-scanning
    • CodeQL
      • Semantic code analysis engine that runs on a regular schedule (see codeql-analysis.yml)
    • trivy
      • Comprehensive vulnerability scanner that runs on PRs into the default branch and scans both our container image and repository code (see trivy-scan-repo and trivy-scan-image jobs in build.yaml)
  • audit-ci
    • Audits npm and Yarn dependencies in CI (see Audit for vulnerabilities step in build.yaml) on PRs into the default branch and fails CI if moderate or higher vulnerabilities (see the script) are present.

Supported Versions

Coder sponsors the development and maintenance of the code-server project. We will fix security issues within 90 days of receiving a report and publish the fix in a subsequent release. The code-server project does not provide backports or patch releases for security issues at this time.


Reporting a Vulnerability

To report a vulnerability, please send an email to security[@], and our security team will respond to you.

See an opportunity to improve our docs? Make an edit.