Security Policy
Supported Versions
| Version | Supported |
|---|---|
| 1.x.x | ✅ Yes |
| < 1.0 | ❌ No |
Reporting a Vulnerability
If you discover a security vulnerability, please email [email protected] instead of using the public issue tracker. Include:- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Response Timeline
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Fix Timeline: Varies by severity
- Public Disclosure: After fix is released
Security Best Practices
API Key Protection
API Key Protection
- Never commit API keys to version control
- Use environment variables
- Rotate keys periodically
- Use separate keys for dev/prod
Dependency Security
Dependency Security
- Keep dependencies updated
- Review security advisories
- Use
npm auditregularly
Safe Usage
Safe Usage
- Validate all user inputs
- Don’t expose keys in logs
- Use HTTPS for API calls
- Implement rate limiting