We take the security of this project seriously. If you believe you have found a security vulnerability, please follow the responsible disclosure process outlined below.
Do NOT report security vulnerabilities through public GitHub issues, discussions, or pull requests.
Instead, please use GitHub's Private Vulnerability Reporting feature to submit your report. This ensures that sensitive details remain confidential until a fix is available.
When reporting, please include as much of the following as possible:
- A description of the vulnerability and its potential impact
- Step-by-step instructions to reproduce the issue
- Any relevant logs, screenshots, or proof-of-concept code
- The version(s) affected, if known
- Acknowledgment: We will acknowledge receipt of your report within 48 hours.
- Detailed response: We will provide a detailed response within 7 days, including an assessment of the issue and an expected timeline for a fix.
- Fix and disclosure: Once a fix is ready, we will coordinate with you on an appropriate disclosure timeline.
Security issues include, but are not limited to:
- Authentication or authorization bypasses
- Injection vulnerabilities (SQL, command, etc.)
- Cross-site scripting (XSS) or cross-site request forgery (CSRF)
- Exposure of sensitive data (credentials, tokens, personal information)
- Remote code execution
- Privilege escalation
- Denial of service vulnerabilities with a clear exploit path
The following are generally not security issues and should be filed as regular bug reports:
- Application crashes without a security impact
- UI/UX bugs
- Performance issues
- Feature requests
- Issues requiring physical access to a user's device
If you are unsure whether something qualifies as a security issue, err on the side of caution and report it through the private vulnerability reporting process.
We follow a coordinated disclosure model:
- The reporter submits the vulnerability privately.
- We work to verify and develop a fix.
- We coordinate with the reporter on a disclosure date, typically once a fix has been released.
- We publicly disclose the vulnerability along with credit to the reporter (unless anonymity is requested).
We ask that reporters refrain from publicly disclosing the vulnerability until we have had a reasonable opportunity to address it.
We appreciate the efforts of security researchers and community members who help keep this project safe. Responsible disclosure makes a meaningful difference.