Contributors to this project are highly aware of the drastic rise in open source software vulnerability exploits. We encourage all members of the community to report any vulnerability as soon as possible. Like the TSA says:
If you see something, say something!
Version | Supported |
---|---|
< 1.0.x | ✅ |
If you believe you have found a security vulnerability in this project, please send an urgent email for the vulnerability, along with details of discovery, to [email protected]. Please do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.
Please include as much of the information listed below as you can to help us better understand and resolve the issue:
- The type of issue (e.g., buffer overflow, dependency vulnerability)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
This information will help us triage your report more quickly.