| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take security seriously. If you discover a security vulnerability, please follow these steps:
Security vulnerabilities should be reported privately to protect users.
Send details to: security@swiftmail.com
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- 24 hours: Initial acknowledgment
- 7 days: Detailed response with assessment
- 30 days: Fix deployed (for confirmed vulnerabilities)
- We will work with you to understand and fix the issue
- We request you keep the vulnerability confidential until we release a fix
- We will credit you in the security advisory (unless you prefer to remain anonymous)
When using SwiftMail:
-
API Keys
- Never commit API keys to version control
- Rotate keys regularly
- Use environment variables
-
Database
- Use strong passwords
- Enable SSL connections
- Restrict network access
-
SMTP
- Use TLS/SSL for connections
- Verify sender domains
- Implement rate limiting
-
Authentication
- Use strong JWT secrets
- Implement token expiration
- Enable 2FA for admin accounts
- API key hashing with bcrypt
- JWT token-based authentication
- Rate limiting on all endpoints
- SQL injection prevention
- CORS protection
- Request ID tracking for audit logs
Subscribe to security advisories:
- GitHub Security Advisories
- Email: security-updates@swiftmail.com
Thank you for helping keep SwiftMail secure! 🔒