| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| < 0.2 | ❌ |
If you discover a security vulnerability in Darwin Scaffold Studio, please report it responsibly:
- Do NOT open a public GitHub issue for security vulnerabilities
- Email the maintainer directly at: demetrios@agourakis.med.br
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Resolution: Depends on severity (critical: 1 week, high: 2 weeks, medium: 1 month)
- Darwin Scaffold Studio processes medical imaging data (MicroCT, SEM)
- All processing is done locally; no data is transmitted externally
- Users are responsible for compliance with their institution's data policies
- Dependencies are pinned in
Manifest.tomlfor reproducibility - Regular dependency audits are performed
- Update to latest compatible versions when security patches are released
- The software reads/writes files only in user-specified directories
- No system-wide file access is required
- Docker containers provide additional isolation
- Keep Updated: Use the latest release
- Verify Downloads: Check release signatures when available
- Isolate Sensitive Data: Use Docker for processing sensitive datasets
- Review Outputs: Verify exported data before sharing
This security policy covers:
- The Darwin Scaffold Studio Julia package
- Docker configurations in this repository
- GitHub Actions workflows
It does NOT cover:
- Third-party dependencies (report to their maintainers)
- User-created extensions or modifications
- Deployment infrastructure (user's responsibility)