| Version | Supported |
|---|---|
| 3.x | ✅ Active |
| 2.x | |
| < 2.0 | ❌ No longer supported |
Do not open a public GitHub issue for security vulnerabilities.
Please report security issues by emailing the maintainer directly (see GitHub profile). Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
You will receive a response within 72 hours. If the issue is confirmed:
- A fix will be developed in a private branch
- A patched release will be published
- You will be credited in the release notes (unless you prefer anonymity)
ANTHROPIC_API_KEYandAPI_KEYmust be set via environment variables only- Never commit
.envfiles —.gitignoreexcludes them - Use
secrets.token_hex(32)to generateSECRET_KEY
- Default: 500 req/hr, 60 req/min per IP
- Set
RATE_LIMIT_ENABLED=truein production
- PatternShield does not store raw browsing history
- Only element text snippets (≤500 chars) are persisted when users scan a page
- Feedback is optional and user-initiated
- No cookies, no tracking
- Set a strong
SECRET_KEY - Set
API_KEY_REQUIRED=true+ a randomAPI_KEY - Configure
CORS_ORIGINSto specific extension ID, not* - Use
DATABASE_URLpointing to PostgreSQL (not SQLite) for multi-instance deployments - Enable HTTPS (Talisman is active when
FLASK_DEBUG=false)