Pre-release project; only master (main branch) receives fixes presently.
Email: security@rumenx.com
Please include:
- Affected endpoints / functions
- Reproduction steps or proof-of-concept
- Impact assessment (confidentiality/integrity/availability)
- Any suggested remediation
You will receive acknowledgement within 72 hours with a tracking reference.
- Triage & reproduce.
- Assign severity (CVSS style qualitative).
- Prepare patch + tests.
- Coordinate disclosure date (default 14 days after fix unless actively exploited).
- Publish fix & brief advisory in repo (SECURITY-ADVISORIES if needed).
In scope: map file parsing vulnerabilities, regex denial-of-service (ReDoS), buffer overflows, configuration bypass allowing unintended 410 responses or skipping intended ones.
Out of scope: transport encryption (terminate TLS upstream), multi-tenancy isolation (not implemented).
Thank you for helping keep the project secure.