We are committed to maintaining the security of this project. The following table shows which versions are currently supported with security patches:
| Version | Supported |
|---|---|
| 1.2.x | β Yes |
| 1.1.x | β No |
| 1.0.x | β Limited support |
| < 1.0 | β No |
Note: We encourage users to always use the latest stable version for maximum security.
If you discover a security vulnerability in this project, please report it responsibly.
Please email us directly at:
π§ [email protected]
with the following information:
- A clear and descriptive summary of the vulnerability
- Steps to reproduce it
- Impact assessment (e.g. data leak, RCE, privilege escalation)
- Suggested fixes or mitigation (optional but helpful)
Please do not create a public GitHub issue for sensitive vulnerabilities.
We will aim to:
- Acknowledge the report within 48 hours
- Investigate and assess severity within 3-5 business days
- Release a fix or mitigation plan depending on the issue's complexity
- Credit you (with your permission) in the changelog or release notes
We practice responsible disclosure. If you report a valid issue, we request a grace period of at least 7 days before public disclosure, allowing us time to patch and notify users.
If the issue is severe, we may request an extended embargo period until a fix is validated.
This tool is intended for ethical use only. Any vulnerability reports should be made with legal authorization for the system being tested. Unauthorized testing or scanning may be considered illegal under local or international laws.
We greatly appreciate responsible researchers and contributors who help make this project more secure!