| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| 0.2.x | ✅ |
If you discover a security vulnerability, please report it by:
- Do NOT open a public issue
- Email the maintainers directly or use GitHub's private vulnerability reporting
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work on a fix.
When using this tool:
- Keep secrets secure: Never commit
config.jsonwith real tokens - Use environment variables: For CI/CD, use environment variables instead of config files
- Limit permissions: Run with minimal required permissions
- Update regularly: Keep dependencies up to date
- Review logs: Monitor for unusual activity
The config.json file contains sensitive information:
- Telegram bot tokens
- Discord webhook URLs
- Email credentials
- HMAC secrets
Always:
- Add
config.jsonto.gitignore(already done by default) - Use
config.example.jsonas a template - Store production secrets in secure vaults or environment variables