Version | Supported |
---|---|
0.2.x | ✅ |
0.1.x | ❌ |
To report a security vulnerability, please email [email protected]
- Initial response: Within 24 hours
- Vulnerability assessment: Within 7 days
- Resolution timeline: Varies by severity
- Data Encryption: All data is encrypted at rest and in transit
- Access Control: Role-based access control (RBAC) implemented
- Audit Logging: All security-related events are logged
- Regular Updates: Dependencies are regularly updated
- Penetration Testing: Regular security assessments conducted
- X-Frame-Options: SAMEORIGIN
- X-Content-Type-Options: nosniff
- X-XSS-Protection: 1; mode=block
- Strict-Transport-Security: max-age=31536000
- API rate limiting: 100 requests per minute per IP
- Burst protection: 20 additional requests allowed