The following versions of this project are currently being supported with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of our project seriously. If you discover a security vulnerability, please follow these steps:
- Do not open a public GitHub issue for security vulnerabilities
- Do not disclose the vulnerability publicly before it has been addressed
- Do not exploit the vulnerability for malicious purposes
- Email us directly at serkanbyx1@gmail.com with details about the vulnerability
- Include the following information:
- Type of vulnerability (e.g., XSS, SQL Injection, Authentication Bypass)
- Step-by-step instructions to reproduce the issue
- Potential impact of the vulnerability
- Any possible solutions you may have identified
- Allow time for response - We will acknowledge receipt within 48 hours
- Work with us to understand and resolve the issue
- Acknowledgment: We will respond to your report within 48 hours
- Communication: We will keep you informed about the progress of fixing the vulnerability
- Resolution: Once the issue is resolved, we will notify you
- Credit: With your permission, we will publicly acknowledge your responsible disclosure
- We will investigate all legitimate reports and do our best to quickly fix the problem
- We will not take legal action against you if you follow this responsible disclosure policy
- We will credit researchers who report valid security issues (unless they prefer to remain anonymous)
When contributing to this project, please ensure:
- Never commit sensitive data (API keys, passwords, tokens)
- Keep dependencies up to date
- Follow secure coding practices
- Use environment variables for sensitive configuration
For security concerns, please contact: serkanbyx1@gmail.com
Thank you for helping keep this project and its users safe!