| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in git-seo, please report it responsibly.
- Do NOT create a public GitHub/GitLab issue for security vulnerabilities
- Email: rhodium-standard@proton.me
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution Target: Within 30 days for critical issues
- Acknowledgment of your report
- Regular updates on progress
- Credit in release notes (unless you prefer anonymity)
- Coordinated disclosure timeline
git-seo may use API tokens for GitHub/GitLab/Bitbucket access:
- Tokens are read from environment variables only (
GITHUB_TOKEN,GITLAB_TOKEN,BITBUCKET_TOKEN) - Tokens are never logged or stored
- HTTPS only for all API communications
- All API requests use HTTPS
- No HTTP fallback
- User-Agent identification for transparency
- Minimal dependency footprint
- Julia packages from official General registry
- Regular dependency audits
This security policy applies to:
- The git-seo CLI tool
- Official releases and packages
- Documentation and examples
- Third-party forks or modifications
- User-provided API tokens (user responsibility)
- Issues in underlying Julia packages (report to respective maintainers)