-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
35 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
# Security Policy | ||
|
||
## Supported Versions | ||
|
||
The table below outlines which versions of the project are actively supported with security updates. | ||
|
||
| Version | Supported | | ||
| ------- | ------------------ | | ||
| 0.9.x | :white_check_mark: | | ||
| 0.8.x | :x: | | ||
| < 0.8.0 | :x: | | ||
|
||
We recommend upgrading to the latest version to ensure you receive critical security updates. | ||
|
||
## Reporting a Vulnerability | ||
|
||
We take security issues seriously and appreciate your efforts to disclose vulnerabilities responsibly. If you find a security issue in our project, please follow the steps below: | ||
|
||
1. **Contact**: Email us at [dev@insysbio.com] to report the issue. Please include: | ||
- A description of the vulnerability. | ||
- Steps to reproduce the issue, if applicable. | ||
- Any relevant details about potential impacts. | ||
|
||
2. **Acknowledgment**: You will receive an acknowledgment email within 48 hours, confirming receipt of your report. | ||
|
||
3. **Investigation**: We will investigate the issue and provide an update within 7 days. During this period, please refrain from publicly disclosing the vulnerability. | ||
|
||
4. **Resolution**: If the issue is confirmed, we will: | ||
- Develop and test a fix. | ||
- Provide a timeline for the release of the fix. | ||
- Credit you (if desired) for reporting the vulnerability. | ||
|
||
5. **Follow-Up**: If your report is not accepted as a valid vulnerability, we will provide an explanation. | ||
|
||
Thank you for helping us maintain the security of this project! |