| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in this package, please report it responsibly:
- Do not open a public GitHub issue
- Email security@jellologic.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- You will receive a response within 48 hours
- A fix will be released as a patch version as soon as possible
This SDK implements the following security practices:
- SQL identifier validation: All database/table names are validated against
^[a-zA-Z_][a-zA-Z0-9_]*$ - No credential exposure: Credentials are never included in error messages or logs
- Input validation: All user-provided options are validated before use
- Dependency pinning: CI uses
--frozen-lockfileto prevent supply chain attacks - Tagged errors: All errors use Effect's
Schema.TaggedErrorfor safe, typed error handling