| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability in deptox, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please use one of these methods:
-
GitHub Private Vulnerability Reporting (Preferred)
- Go to the Security tab
- Click "Report a vulnerability"
- Fill out the form with details
-
Email
- Send details to the repository owner via GitHub
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution Target: Within 90 days (following industry best practice)
- We'll acknowledge your report promptly
- We'll investigate and keep you informed of progress
- We'll credit you in the release notes (unless you prefer anonymity)
- We'll coordinate disclosure timing with you
deptox implements several security practices:
- Code Signing: Releases are signed with Apple Developer ID (when configured)
- Notarization: Apps are notarized by Apple for Gatekeeper verification
- Update Signing: Auto-updates are cryptographically signed
- Dependency Auditing: Regular security audits via
pnpm audit - CodeQL Analysis: Automated security scanning on every PR
- No Network Access: deptox operates entirely locally with no data transmission
This security policy covers:
- The deptox macOS application
- The official GitHub repository
- Official release artifacts (.dmg files)
Out of scope:
- Third-party forks or modifications
- Self-compiled builds
- Issues in dependencies (report those to the respective projects)