We actively maintain security updates for the following versions:
Version | Supported |
---|---|
0.10.x | ✅ |
0.9.x | ✅ |
< 0.9 | ❌ |
We take security vulnerabilities seriously. Please do not report security vulnerabilities through public GitHub issues.
Please report security vulnerabilities by emailing [email protected] with the following information:
- Type of issue (buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
- Initial Response: Within 48 hours of report submission
- Status Update: Within 7 days with preliminary assessment
- Resolution: Security patches released within 90 days for critical issues
This project implements several security measures:
- Input Validation: All file inputs are validated and sanitized
- Secure File Handling: Temporary files use restricted permissions (0o600)
- Dependency Scanning: Regular automated security scanning via Bandit and CodeQL
- Safe Defaults: Security-first configuration defaults
- Memory Safety: Proper cleanup of temporary files and sensitive data
We appreciate security researchers who responsibly disclose vulnerabilities. With your permission, we will acknowledge your contribution in our security advisories.
When using this software:
- Keep Dependencies Updated: Regularly update all dependencies
- File Size Limits: Configure appropriate file size limits for your environment
- Access Controls: Implement proper authentication and authorization
- Audit Logging: Enable audit logging in production environments
- Network Security: Use HTTPS/TLS for all communications