| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
If you discover a security vulnerability in DonkeyKong, please report it by emailing:
Please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We'll acknowledge receipt within 48 hours and provide updates as we investigate.
When using DonkeyKong:
- Be cautious with URLs/entities you process
- Validate Ollama model sources
- Use environment variables for sensitive data
- Review collected data before analysis
- Consider network isolation for sensitive workloads
Thank you for helping keep DonkeyKong secure!