Thank you for taking the time to help make Scripts-for-Integration safer for everyone.
We follow a coordinated vulnerability disclosure model. Please read the entire document before reporting.
Only the latest minor release line receives regular security fixes.
Version | Supported | Notes |
---|---|---|
v2.x |
✔️ | Actively patched |
< v2 |
❌ | End-of-life |
If you cannot upgrade and need a back-port, open an Issue marked [Security-Request] and we will discuss options privately.
-
Email:
git@bookshelf-writer.fun
-
Include at minimum
- Affected version/commit hash
- Reproduction steps or PoC
- Impact assessment (confidentiality / integrity / availability)
- Your public PGP key for us to reply
-
We will acknowledge within 72 hours and provide a tracking ID.
Please do not open public Issues or discuss details in GitHub discussions/PRs until a fix is released.
Phase | Typical Timeframe | Description |
---|---|---|
Triage | ≤ 3 days | Confirm severity, assign CVE if needed |
Remediation | ≤ 14 days | Develop & test patch, prepare advisory |
Pre-release | ≤ 7 days | Notify maintainers of downstream forks under embargo |
Public Release | – | Merge fix into main , push tags, publish advisory |
Complex or high-risk issues may require longer; we will keep you informed.
We align with CVSS 4.0 scoring:
- Critical (9.0–10.0): Remote code execution, auth bypass
- High (7.0–8.9): Privilege escalation, data exfiltration
- Medium (4.0–6.9): Info disclosure, DoS requiring auth
- Low (< 4.0): Non-exploitable or requires uncommon configuration
Security reports are handled on a best-effort basis by maintainers in their spare time.
This project comes with no warranty; refer to the LICENSE for details.