Version | Supported |
---|---|
0.2.x | ✅ |
< 0.2 | ❌ |
If you discover a security vulnerability in SyncGuard, please report it responsibly:
DO NOT open a public issue for security vulnerabilities.
Instead, please email: [email protected]
Include in your report:
- Description of the vulnerability
- Steps to reproduce (if applicable)
- Potential impact
- Suggested fix (if you have one)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix timeline: Depends on severity, typically 1-4 weeks
Critical vulnerabilities affecting distributed locking integrity will be prioritized and may receive emergency patches.
SyncGuard handles distributed locking, which is security-sensitive. Key areas:
- Lock integrity: Preventing unauthorized lock acquisition/release
- Timing attacks: Protecting against race conditions in lock operations
- Backend security: Proper configuration of Redis/Firestore credentials
- Dependencies: Regular updates to prevent supply chain attacks
When using SyncGuard:
- Secure your backends: Use proper authentication for Redis/Firestore
- Network security: Use TLS/SSL for backend connections
- Access control: Limit who can acquire/release locks
- Monitoring: Log lock operations for audit trails
- Key management: Use non-predictable lock keys when needed
- Vulnerabilities will be disclosed publicly after fixes are available
- Credit will be given to security researchers (with permission)
- CVE numbers will be requested for significant vulnerabilities
This policy may be updated as the project evolves. Last updated: 2025-09-27