At Deepgram, we take security seriously. We appreciate your help in keeping our projects and community safe by disclosing vulnerabilities responsibly.
If you believe you've found a security vulnerability in any Deepgram-owned repository, please report it to us via email at [email protected].
Please include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any potential solutions you've identified (optional)
After you submit a vulnerability report, you can expect:
- Acknowledgement: We'll acknowledge receipt of your report within 48 hours.
- Validation: Our security team will validate the issue.
- Resolution Timeline: We'll provide an estimated timeline for resolution.
- Resolution: Once resolved, we'll notify you.
- Recognition: With your permission, we'll acknowledge your contribution.
While this repository primarily contains documentation, we still take security concerns seriously:
- Code examples should follow security best practices
- API keys in examples should be clearly marked as placeholders
- Security-related documentation should be technically accurate
When contributing content to this repository, please follow these security best practices:
- Never commit real API keys or credentials
- Use placeholder values for sensitive information (e.g.,
YOUR_API_KEY
) - Ensure code examples follow secure coding practices
- Document necessary security considerations for any implementations
For security updates relating to Deepgram products, please refer to the Deepgram Developer Documentation.
Major security updates will be communicated through:
- Release notes
- The Deepgram Developer Newsletter
- Deepgram Community Discord
Thank you for helping keep Deepgram and our community safe!