We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
- Go to the Security tab
- Click "Report a vulnerability"
- Fill out the form with details
Send an email to: security@example.com
Include as much information as possible:
- Type of vulnerability
- Affected versions
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability and determine severity
- Updates: We will keep you informed of progress every 7 days
- Resolution: We aim to release a fix within 90 days for high-severity issues
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
- Assessment: Verify and assess the reported vulnerability
- Fix Development: Develop and test a fix in a private repository
- Advisory: Create a security advisory with details
- Release: Release a patched version
- Disclosure: Publicly disclose the vulnerability after users have had time to update
- We follow coordinated disclosure
- Security advisories are published after a fix is released
- We request a 90-day embargo period for critical vulnerabilities
- Reporters are credited in security advisories
When using this package:
- Keep Updated: Always use the latest version
- Review Dependencies: Regularly audit dependencies for known vulnerabilities
- Secure Configuration: Follow security best practices in configuration
- Environment Variables: Never commit secrets to version control
- Access Control: Limit access to production systems
This package may read sensitive data from environment variables. Always:
- Use
.envrc.localfor secrets (git-ignored) - Never commit
.envfiles with real credentials - Use secrets management in production (e.g., AWS Secrets Manager, HashiCorp Vault)
We use automated tools to monitor dependencies:
- Dependabot for dependency updates
- GitHub Security Advisories for known vulnerabilities
- Regular security audits with
doit audit(pip-audit)
Run a security audit of dependencies:
# Install security dependencies
uv pip install -e ".[security]"
# Run security audit
doit auditWe currently do not have a bug bounty program.
We recognize security researchers who help us keep this project secure:
- Your name could be here!
If you have questions about this security policy, please open a GitHub issue with the "security" label or contact us at security@example.com.
Last updated: 2025-12-05