| Version | Supported |
|---|---|
| 0.5.x | ✅ |
| 0.4.x | ✅ |
| < 0.4 | ❌ |
If you discover a security vulnerability in RefineryOpt, please report it responsibly:
- Do NOT open a public GitHub issue for security vulnerabilities
- Email the maintainers directly at: [security@your-domain.com]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution Timeline: Depends on severity
- Critical: 24-72 hours
- High: 7 days
- Medium: 30 days
- Low: 90 days
This security policy applies to:
- The main RefineryOpt Python package
- Example configurations
- Documentation
- Third-party dependencies (report to respective maintainers)
- Issues in forked repositories
When using RefineryOpt:
- Never commit credentials - Use environment variables for API keys
- Validate input data - Especially when loading external YAML/JSON
- Use virtual environments - Isolate dependencies
- Keep dependencies updated - Run
pip list --outdatedregularly
We appreciate security researchers who help keep RefineryOpt safe. Contributors will be acknowledged (with permission) in our security hall of fame.