Security fixes are expected to target:
- the latest
mainbranch
Older snapshots, forks, and stale branches may not receive coordinated fixes.
Please do not report security vulnerabilities in a public GitHub issue.
Examples of issues that should be reported privately:
- authentication bypass
- authorization flaws
- token or secret exposure
- injection vulnerabilities
- insecure file upload or archive extraction
- path traversal
- privilege escalation
- collaboration-server abuse
Use GitHub's private vulnerability reporting flow if it is enabled for the repository.
If that is not available, contact the maintainer privately through GitHub and include:
- a clear summary
- affected area or file
- steps to reproduce
- impact
- proof of concept, if safe to share
- any suggested mitigation
Maintainers will try to:
- acknowledge the report
- reproduce the issue
- assess severity and affected scope
- prepare a fix or mitigation
- credit the reporter where appropriate
Response times may vary based on maintainer availability.
Please avoid public disclosure until:
- the issue has been confirmed
- maintainers have had reasonable time to prepare a fix
- users can be given actionable remediation guidance
When contributing code:
- never commit secrets or
.envfiles - validate input at system boundaries
- avoid weakening auth or access checks
- sanitize file handling and user-controlled paths
- prefer explicit schemas for request validation
- call out security-sensitive changes in your PR description