| Version | Supported |
|---|---|
| 0.2.x | Yes |
| < 0.2 | No |
If you discover a security vulnerability in alimentar, please report it responsibly:
- Do not open a public GitHub issue
- Email security concerns to the maintainers
- Include a description of the vulnerability and steps to reproduce
We will acknowledge receipt within 48 hours and provide a timeline for a fix.
cargo auditruns in CI on every push and weeklycargo denyenforces license compliance and bans known-vulnerable cratesunsafecode is denied at the crate level (unsafe_code = "deny")- All dependencies are sourced from crates.io (no git dependencies)
- Format encryption uses
aes-gcmwithargon2key derivation - Format signing uses
ed25519-dalek
We use cargo-deny to enforce:
- No yanked crates
- License compliance (MIT/Apache-2.0/BSD compatible)
- No wildcard dependencies
- All crates from crates.io registry