| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability in Hymma.Solidworks, please report it responsibly.
- Do not open a public GitHub issue for security vulnerabilities
- Email the maintainers directly or use GitHub's private vulnerability reporting feature
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Resolution Timeline: Depends on severity, typically 30-90 days
This security policy covers:
- The core library packages (Interop, Extensions, Addins, Addins.Fluent)
- Sample add-ins (QRify, QRifyPlus)
- Vulnerabilities in SolidWorks itself
- Issues in third-party dependencies (report to respective maintainers)
- Social engineering attacks
When using Hymma.Solidworks in your add-ins:
- Sign your assemblies with a strong name key
- Validate user input before processing
- Use secure coding practices for file operations
- Keep dependencies updated to patch known vulnerabilities
- Register COM objects with appropriate permissions