The following versions of AsperHeader are currently being supported with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We recommend always using the latest version available on the VS Code Marketplace or Open VSX Registry.
We take the security of AsperHeader seriously. If you discover a security vulnerability, please follow these steps:
DO NOT open a public issue for security vulnerabilities. Instead:
-
Email the maintainers directly at:
- Repository: Create a private security advisory
- Or contact the publisher directly through VS Code Marketplace
-
Provide details including:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Your contact information for follow-up
- Initial Response: Within 48 hours of report submission
- Status Update: Within 7 days with assessment and planned fix timeline
- Fix Deployment: Depends on severity:
- Critical: Within 7 days
- High: Within 14 days
- Medium: Within 30 days
- Low: Next regular release
- Arbitrary code execution
- Unauthorized file system access beyond workspace boundaries
- Exposure of sensitive information (credentials, tokens, etc.)
- Privilege escalation
- Injection vulnerabilities
- Dependencies with known CVEs affecting AsperHeader functionality
- Bugs that don't have security implications (use bug reports)
- Feature requests (use feature requests)
- Questions about usage (use discussions)
When using AsperHeader:
- Keep Updated: Always use the latest version to benefit from security patches
- Review Permissions: AsperHeader only requires access to your workspace files
- Workspace Trust: Be mindful when opening untrusted workspaces with the extension enabled
- Configuration: Review custom configurations, especially
languagePrependandlanguageAppendsettings
AsperHeader follows a conservative update philosophy to minimize security and behavior risks:
- All minor and patch versions (1.0.x → 1.0.y) are fully backward compatible
- Existing configurations continue to work without modification
- Default behavior remains consistent across updates
New features are disabled by default to prevent unexpected behavior changes:
- Comment overrides (
languageSingleLineCommentOverride,languageMultiLineCommentOverride): Empty by default - Prepend/Append text (
languagePrepend,languageAppend): Empty by default - Feature flags: New toggles default to
falseor maintain existing behavior
This means:
- Updates won't inject unexpected code into your files
- You explicitly control when new features activate
- Security patches can be applied immediately without fear of breaking changes
- No surprises when auto-update is enabled
You can safely update to the latest version knowing your existing headers and workflows will continue functioning identically until you explicitly enable new features.
Once a vulnerability is fixed:
- We will release a patched version
- Update the CHANGELOG.md with security fix notes (without revealing exploit details)
- Credit the reporter (if they wish to be credited)
- Publish a security advisory on GitHub (if severity warrants)
AsperHeader uses Renovate bot for dependency updates. Security patches for dependencies are applied promptly:
- npm audit is run regularly in CI/CD
- Critical/High severity vulnerabilities are addressed immediately
- Dependency overrides may be used for transitive dependencies
For security concerns, please use:
- GitHub Security Advisories (preferred)
- Direct contact through publisher profile
- Public issues for non-security bugs
Thank you for helping keep AsperHeader and its users safe!