- All the code that we own is analyzed with Bandit security tool
- We use strict CodeQL security checks on GitHub
- We update our dependencies regularly, however, we use a cooldown of 7 days to limit the chances of a 0 day vulnerability
- We check for known CVEs in our dependencies using
uv audittool and GitHub's Dependabot security audit feature - We do not allow AI generated slop to pollute the repository
- We follow all RFCs and guidelines for the features we expose
- We don't write anything from scratch, if we use JWT feature,
we use
pyjwtas a trusted dependency - We minimize the number of runtime dependencies
- We use PyPI Trusted Publishing
- We use strict analysis of our CI jobs with
zizmor, we pin all the actions to exact hashes - We do not disclose 0 day security issues publicly
Do you have a Python / Django project that you need to audit for security / performance?
Who will help you?
- CPython Core Developer
- Django Software Foundation member
- Maintainer of dozens of other opensource projects
- This project's original author :)
Drop me a line: mail at sobolevn dot me.
I do consulting for 10+ years now, so I can surely help your company.
We take security vulnerabilities very seriously. To reach the response team, fill in our vulnerability form at https://github.com/wemake-services/django-modern-rest/security/advisories/new
Only the response team members will see your report, and it will be treated confidentially.
The security team does not accept reports that only affect pre-release versions of software, as these features are considered "in-development", please open public issues.
The security team does not accept reports for third-party packages.
Or scope is limited to django-modern-rest only.
Those reports should be directed towards their
corresponding distribution security contact.
Please, read our AI Policy before submitting reports made with the use of AI / LLM tools.
The following is an overview of the vulnerability handling process from reporting to disclosure:
- The reporter reports the vulnerability privately to the security team.
- If the security team determines the report isn't a vulnerability, the issue can be opened in a public issue tracker if applicable.
- If the report constitutes a vulnerability, the security team will work privately with the reporter to resolve the vulnerability.
- The project creates a new release to deliver the fix.
- The project publicly announces the vulnerability and describes how to apply the fix via an advisory. At this point the vulnerability can be discussed publicly by the reporter and team.
While we sincerely appreciate and encourage reports of suspected security problems, please note that the project does not run any bug bounty programs. We are an opensource project, depending on donation and support from the community.