Use this section to tell people about which versions of your project are currently being supported with security updates.
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability in GitCo, please follow these steps:
Security vulnerabilities should be reported privately to avoid potential exploitation.
Send an email to fortyone.technologies@gmail.com with the following information:
- Subject:
[SECURITY] GitCo Vulnerability Report - Description: Detailed description of the vulnerability
- Steps to reproduce: Clear steps to reproduce the issue
- Impact: Potential impact of the vulnerability
- Suggested fix: If you have any suggestions for fixing the issue
- Affected versions: Which versions are affected
- Your contact information: How we can reach you for follow-up questions
- Acknowledgment: You will receive an acknowledgment within 48 hours
- Investigation: Our security team will investigate the reported vulnerability
- Fix development: If confirmed, we will develop a fix
- Disclosure: We will coordinate disclosure with you
- Release: A security patch will be released
- 48 hours: Initial response and acknowledgment
- 7 days: Status update and timeline
- 30 days: Target for fix release (may vary based on complexity)
- Keep GitCo updated: Always use the latest stable version
- Secure API keys: Never commit API keys to version control
- Review configurations: Regularly review your
~/.gitco/config.ymlfor sensitive information - Monitor logs: Check logs for any suspicious activity
- Follow secure coding practices: Use the security linters and checks in our CI
- Review dependencies: Be aware of security implications when adding new dependencies
- Test thoroughly: Ensure security-related changes are thoroughly tested
- Document security features: Document any security-related functionality
GitCo implements several security measures:
- Local-only processing: Sensitive data is processed locally
- No data collection: GitCo does not collect or transmit user data
- Secure API key handling: API keys are managed securely through environment variables
- Input validation: All user inputs are validated to prevent injection attacks
- Dependency scanning: Regular security scans of dependencies
- PyPI authentication security: Secure token validation and management
- Package security validation: Comprehensive package scanning before publishing
- Secret detection: Automated scanning for hardcoded secrets and credentials
Our CI pipeline includes several security tools:
- pip-audit: Scans for known vulnerabilities in Python dependencies
- bandit: Static analysis tool for security issues
- ruff: Includes security-focused linting rules
- Dependabot: Automated dependency updates with security patches
- detect-secrets: Detects secrets and credentials in code
- safety: Additional dependency vulnerability scanning
- Token validation: Ensures proper PyPI token format and scope
For security-related questions or concerns:
- Email: fortyone.technologies@gmail.com
- PGP Key: Available upon request
- Response time: Within 48 hours for security issues