Security is our priority. This document explains how we handle security issues.
We provide security updates for all versions of our project:
| Version | Supported |
|---|---|
| All | ✅ |
If you find a vulnerability, report it so we can fix it quickly.
- Description of the issue
- Steps to reproduce
- Potential impact
- Suggested fixes (if any)
We’ll confirm your report within 48 hours and aim to respond within a week.
Do not publicly disclose the issue until we’ve fixed it.
We follow these security practices to ensure the safety and reliability of our project:
- Code Reviews: All code changes are reviewed by the team to prevent vulnerabilities.
- Automated Testing: We use automated tests to detect potential security issues early.
- Dependency Management: We regularly update dependencies to address known vulnerabilities.
- Secure Coding Standards: We adhere to secure coding guidelines to minimize risks.
- User Input Validation: All user inputs are validated to prevent common attacks like injection.
- Least Privilege Principle: Access to sensitive resources is restricted to only what is necessary.