We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability, please follow these steps:
-
Do not open a public issue for security vulnerabilities
-
Send an email to [[email protected]] with:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if available)
-
We will acknowledge receipt within 48 hours
-
We will provide an initial assessment within 7 days
-
We will work on a fix and coordinate disclosure
This tool:
- Does not send any data to external servers
- Only reads local files in your project directory
- Does not execute any external commands
- Has zero runtime dependencies to minimize attack surface
When using this tool:
- Review configuration files before committing
- Use in trusted development environments
- Keep the tool updated to the latest version
- Report any suspicious behavior immediately