| Version | Supported |
|---|---|
| 2.0.x | Yes |
| 1.1.x | Security fixes only |
| < 1.1 | No |
If you discover a security vulnerability, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities.
- Email the maintainer at montycraig@users.noreply.github.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix timeline: Depends on severity (critical: 24-72 hours, high: 1 week, medium: 2 weeks)
- Confirmation that we received your report
- An assessment of the vulnerability and its severity
- A timeline for the fix
- Credit in the release notes (unless you prefer anonymity)
- All file operations use safe wrappers with validation
- Path traversal attacks are prevented by path normalization and validation
- Destructive operations require explicit confirmation
- Secure deletion overwrites file contents before unlinking
- All file paths are validated and normalized (no
..traversal) - Filenames are checked for invalid characters and path separators
- Pydantic v2 models enforce strict type validation on all data
- File extensions are normalized to prevent bypass attacks
- Configuration files are stored in user home directory with appropriate permissions
- No sensitive data (passwords, tokens) is stored in configuration
- Configuration parsing handles malformed JSON gracefully without crashing
- Dependencies are pinned to known-good versions
- Regular dependency audits via
pip-auditand Dependabot - Minimal dependency footprint to reduce attack surface
- Run with least-privilege permissions
- Review
--dry-runoutput before executing bulk operations - Keep the tool updated to the latest version
- Report any unexpected behavior