| Version | Supported |
|---|---|
| Latest | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
- DO NOT create a public GitHub issue
- Email security details to the maintainers
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
When using Atom:
-
Validation: Always implement the
Validatorinterface to validate data before atomization. This prevents malformed data from entering your storage layer. -
ID Security: The
Atoms.IDfield is used as a key identifier. Ensure IDs don't contain sensitive information and are properly sanitized. -
Encoding: The encoding utilities are designed for internal use. When exposing data externally, consider additional encryption or encoding as needed.
-
Field Exposure: Be aware that field names and types are discoverable via metadata. Review your struct definitions for information disclosure.
Atom is designed with security in mind:
- Minimal dependencies (only sentinel)
- No network operations
- No file system operations
- Validation hooks before atomization
- Type-safe generics prevent runtime type errors
We appreciate responsible disclosure of security vulnerabilities.