We are currently in alpha, so do not have specific versions, but we will once the first GA release is made. So security fixes are on a best efforts basis.
Please do not report security vulnerabilities through public GitHub issues. To protect our users and the integrity of the project, we follow a Responsible Disclosure model.
This means we keep details of a bug private until a fix is ready and users have had a reasonable amount of time to update.
If you discover a potential security flaw, please report it via one of the following channels:
- GitHub Security Advisory (Preferred): Navigate to the "Security" tab of this repository and select "Report a vulnerability." This allows for private collaboration between you and the maintainers.
To help us triage the issue quickly, please include:
- A brief description of the vulnerability.
- Step-by-step instructions to reproduce the issue (PoC).
- The potential impact (e.g., "unauthenticated remote code execution").
Once a report is received, the maintainers will:
- Acknowledge: Confirm receipt of the report within 48 hours.
- Triage: Investigate the issue and determine the severity.
- Fix: Develop a patch in a private fork/branch.
- Disclose: Once the fix is merged and a new release is published, we will issue a CVE (Common Vulnerabilities and Exposures) and publicly credit you for the discovery (unless you prefer to remain anonymous).
Note: We ask that you do not share details of the vulnerability with the public or any third party until we have released a fix. Premature disclosure puts all current users at risk.
When a bug is made public before a patch exists, it creates a "Zero-Day" scenario. This gives malicious actors a blueprint to attack systems before maintainers can build a defense. By keeping bugs private at first, we ensure that the "good guys" have the upper hand.