| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take security seriously. If you discover a security vulnerability, please report it responsibly.
- Do NOT create a public GitHub issue for security vulnerabilities
- Email security concerns to: [your-email@example.com]
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours of your report
- Assessment: Within 7 days, we'll assess the vulnerability and determine its severity
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Disclosure: We'll coordinate with you on public disclosure timing
Security issues we're interested in:
- Authentication/authorization bypasses
- Code injection vulnerabilities
- Sensitive data exposure
- Cryptographic weaknesses
- Unsafe handling of API credentials
- Denial of service attacks
- Social engineering
- Physical attacks
- Issues in dependencies (report to upstream)
We consider security research conducted in good faith to be authorized. We will not pursue legal action against researchers who:
- Make a good faith effort to avoid privacy violations and disruption
- Provide us reasonable time to fix the issue before public disclosure
- Do not exploit the vulnerability beyond what's necessary to demonstrate it
- Never commit API keys to version control
- Use environment variables for sensitive data
- Rotate API keys regularly
- Use paper trading mode for testing
- Keep configuration files private
- Don't share configuration with API secrets
- Use appropriate file permissions
- Run with minimal required permissions
- Monitor for unusual activity
- Keep the application updated
We appreciate the security research community and will acknowledge researchers who help improve our security (with their permission).