| Version | Supported |
|---|---|
| 0.1.x | yes |
| < 0.1.0 | no |
- Do not open public issues for exploitable findings.
- Email the maintainers with:
- impact summary
- reproduction steps
- affected files/commands
- Maintainers acknowledge within 72 hours and provide a mitigation timeline.
- Triage and reproduce.
- Contain impact (disable affected path or gate release).
- Patch and add regression tests.
- Rotate any potentially exposed credentials.
- Publish a security note in release notes.
- Secrets must never be committed to git.
- Secrets must never be hardcoded in scripts or templates.
- Runtime credentials are injected via environment variables only.
- CI and release gate include secret scanning.
If a token is exposed:
- Revoke immediately at provider side.
- Generate replacement token.
- Update CI/runtime secret stores.
- Re-run release gate before any release action.