You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We generally support (accept vulnerability reports against) the latest published minor version on npm. Older versions may be fixed selectively if the patch is low risk.
6
+
7
+
| Version | Supported |
8
+
| ------- | --------- |
9
+
| latest | ✅ |
10
+
| < latest | ⚠️ security issues may not be patched |
11
+
12
+
## Reporting a Vulnerability
13
+
14
+
If you discover a security vulnerability:
15
+
16
+
1. DO NOT open a public issue.
17
+
2. Email: `security@placeholder.invalid` (replace with a real contact) OR use GitHub private vulnerability reporting if enabled.
18
+
3. Provide a minimal reproduction, impact assessment, and proposed disclosure timeline.
19
+
20
+
We'll acknowledge receipt within 72 hours and aim to provide an initial remediation plan within 7 days.
21
+
22
+
## Handling & Disclosure Process
23
+
24
+
1. Triage & reproduce.
25
+
2. Assess severity (CVSS-like scoring internal).
26
+
3. Develop & test fix.
27
+
4. Release a patched version to npm.
28
+
5. Publicly disclose via release notes / changelog after users have reasonable upgrade window.
29
+
30
+
## Best Practices for Users
31
+
32
+
- Always pin to a specific version range and upgrade promptly when patches release.
0 commit comments