| Version | Supported |
|---|---|
| 1.x.x | Yes |
If you discover a security vulnerability in jwt-term, please report it responsibly. Do not open a public GitHub issue.
Send an email to felipe.morandini@gmail.com with:
- A description of the vulnerability
- Steps to reproduce the issue
- The potential impact
- Any suggested fixes (optional)
- Acknowledgment within 48 hours of your report
- Status update within 7 days with an assessment and remediation timeline
- Credit in the release notes (unless you prefer to remain anonymous)
The following are in scope for security reports:
- Secret or token leakage through stdout, stderr, error messages, or debug output
- Memory safety issues, including unsafe or memory-unsound behavior in dependencies
- Unintended network requests (any network call not triggered by
--jwks-url) - Input validation bypasses (malformed tokens causing panics or undefined behavior)
- Dependency vulnerabilities affecting jwt-term's functionality
- Tokens passed as CLI arguments being visible in shell history (this is documented behavior; use
--token-envor stdin instead) - Denial of service through extremely large tokens (a 16 KB size limit is enforced for token input)
For details on how jwt-term handles security, see the Security Architecture section of the architecture documentation.