All published packages include cryptographic provenance attestations that prove:
- Package was built by GitHub Actions from verified source code
- Build process was not tampered with
- Package contents match the committed code
Verify package authenticity:
npm view git-contributor-stats --json | jq .provenance
npm audit signatures- β Automated releases via GitHub Actions
- β Granular NPM tokens (scoped to this package, 90-day expiration)
- β No secrets in repository
- β Full audit trail in GitHub Actions logs
# Check for vulnerabilities
npm audit
# Auto-fix (when possible)
npm audit fix- β Automated validation: Pre-commit hooks (lint, typecheck, format)
- β Conventional commits: Commitlint enforces message format
- β Branch protection: PR reviews required, no direct pushes to main
- β Release security: Automated changelog, provenance attestations
- β Dependency scanning: Automated security updates via Dependabot
Please do not open public issues for security vulnerabilities.
Report privately:
- Email: vikkrant.xx7@gmail.com
- Subject:
[SECURITY] git-contributor-stats vulnerability - Include: Description, steps to reproduce, potential impact
Response timeline:
- Initial response: Within 48 hours
- Fix timeline: Based on severity (1 week for critical, 2 weeks for high)
We follow coordinated disclosure - issues are fixed privately before public announcement.
Every published package includes provenance linking to:
- Exact source code commit
- GitHub Actions workflow that built it
- Cryptographic signature
Verify authenticity:
# Check provenance
npm view git-contributor-stats
# Verify signature
npm audit signaturesWhen contributing:
- Keep dependencies updated (
npm audit fix) - Never commit secrets (use
.envfiles) - Review new dependencies carefully
- Sign commits (recommended)
When reviewing PRs:
- Check for exposed secrets
- Review dependency changes
- Verify tests pass
- Validate changeset
Regular tasks:
- Rotate NPM token every 90 days
- Review GitHub Actions logs
- Merge Dependabot PRs promptly
Before releases:
- Tests passing β
- No known vulnerabilities β
- Dependencies updated β
If compromised:
- Revoke tokens immediately
- Publish patched version
- Notify users via GitHub release
This project follows:
- SLSA Level 2 - Build provenance
- Semantic Versioning - Clear versioning
- Conventional Commits - Traceable changes
We appreciate responsible disclosure of security vulnerabilities.
Last Updated: November 8, 2025
For questions about security, contact: vikkrant.xx7@gmail.com