If you discover a security vulnerability in Nemlig Shopper, please report it responsibly:
- Do not open a public GitHub issue
- Email the maintainer directly or use GitHub's private vulnerability reporting feature
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work with you to understand and address the issue.
| Version | Supported |
|---|---|
| 1.x.x | Yes |
| < 1.0 | No |
Nemlig Shopper stores credentials locally when you use nemlig login:
- Location:
~/.nemlig-shopper/credentials.json - Permissions: File is created with
chmod 600(owner read/write only) - Format: Plain JSON with email and password
Recommendations:
- Use environment variables (
.envfile) instead of saved credentials when possible - Add
.envto your global.gitignore - Never commit credentials to version control
- Use
nemlig logoutto remove saved credentials when no longer needed
Credentials can be provided via environment variables:
export NEMLIG_USERNAME="your-email@example.com"
export NEMLIG_PASSWORD="your-password"Or in a .env file (automatically loaded by the CLI).
- All communication with Nemlig.com uses HTTPS
- JWT tokens are used for session management
- Tokens are stored in memory only (not persisted)
- We don't send your credentials anywhere except Nemlig.com
- We don't log passwords or sensitive data
- We don't store session tokens on disk
- We don't include analytics or telemetry
- Authentication and credential handling
- API communication security
- Local file permission issues
- Injection vulnerabilities (command, path traversal, etc.)
- Vulnerabilities in Nemlig.com's API (report to Nemlig directly)
- Issues requiring physical access to the user's machine
- Social engineering attacks
- Denial of service
- Keep your system updated - Ensure Python and dependencies are current
- Use a virtual environment - Isolate project dependencies
- Review
.envfiles - Never share or commit them - Monitor your Nemlig account - Check for unauthorized orders
- Use strong passwords - For your Nemlig.com account
We use automated tools to monitor dependencies:
- Dependabot alerts (GitHub)
- Regular
uvupdates
To check for known vulnerabilities in dependencies:
uv pip auditWe appreciate responsible disclosure and will credit security researchers (with permission) for any vulnerabilities they help us fix.