We release patches for security vulnerabilities. The following versions are currently supported:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of our software seriously. If you discover a security vulnerability, please follow these steps:
Please do not create a public GitHub issue for security vulnerabilities. This could put all users at risk.
Send your vulnerability report to security@semcl.one with the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if any)
- Your contact information
- Initial Response: Within 48 hours of your report
- Status Update: Within 7 days with either a fix timeline or request for more information
- Resolution: We aim to patch critical vulnerabilities within 30 days
- We will work with you to understand and resolve the issue
- Once fixed, we will coordinate disclosure timing with you
- You will be credited in our security advisory (unless you prefer to remain anonymous)
When using this project, please follow these security best practices:
- Keep Dependencies Updated: Regularly update dependencies using
npm updateor similar - Use Environment Variables: Never commit secrets, API keys, or credentials to the repository
- Review Code: Review any code changes before deployment
- Enable Security Features: Use security headers, HTTPS, and other built-in security features
[List any known security considerations or limitations users should be aware of]
Security updates will be released as patch versions (e.g., 1.0.1) and announced via:
- GitHub Security Advisories
- Release notes
- Our security mailing list (subscribe at security@semcl.one)
[If applicable] We currently [do/do not] have a bug bounty program. For more information, visit [link].
For security-related questions or concerns:
- Email: security@semcl.one
- PGP Key: [If applicable, provide PGP key or link]
Thank you for helping keep SEMCL.ONE and our users safe!