We actively support the following versions of @calimero-network/mero-js:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0.0 | ❌ |
If you discover a security vulnerability, please do not open a public issue. Instead, please report it via one of the following methods:
- Email: security@calimero.network
- GitHub Security Advisory: Use the Security tab in the repository
When reporting a vulnerability, please include:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if any)
We aim to acknowledge security reports within 48 hours and provide an initial assessment within 7 days. We will keep you informed of our progress throughout the process.
- We will work with you to understand and resolve the issue quickly
- Security vulnerabilities will be disclosed publicly after a fix is available
- Credit will be given to the reporter (unless they prefer to remain anonymous)
When using @calimero-network/mero-js:
- Keep dependencies updated: Regularly update to the latest version
- Use HTTPS: Always use HTTPS endpoints for API calls
- Protect credentials: Never commit tokens or credentials to version control
- Validate inputs: Always validate and sanitize user inputs
- Use environment variables: Store sensitive configuration in environment variables
- This package has zero runtime dependencies to minimize attack surface
- All HTTP requests use Web Standards (
fetchAPI) - Token management is handled in-memory by default (consider persistent storage for production)