| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security vulnerabilities through one of these channels:
-
GitHub Security Advisories (Preferred):
- Go to Security Advisories
- Click "Report a vulnerability"
- Fill out the form with details
-
Email:
- Send details to: security@kopexa.com
- Use subject:
[SECURITY] kspec vulnerability report
Please include the following information:
- Type of vulnerability (e.g., injection, authentication bypass, etc.)
- Full path to the affected source file(s)
- Steps to reproduce the issue
- Proof-of-concept or exploit code (if available)
- Impact assessment
- Any suggested fixes
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days (depending on severity)
- We will acknowledge receipt of your report
- We will confirm the vulnerability and determine its impact
- We will release a fix and publicly disclose the issue
- We will credit you for the discovery (unless you prefer anonymity)
We consider security research conducted in accordance with this policy to be:
- Authorized
- Not a violation of any terms of service
- Helpful to the security of our users
We will not pursue legal action against researchers who:
- Follow this disclosure policy
- Make a good faith effort to avoid privacy violations
- Do not exploit vulnerabilities beyond proof of concept
- Do not disclose vulnerabilities publicly before we've addressed them
When using kspec:
- Credentials: Never commit credentials to source control
- Permissions: Use least-privilege service accounts
- Tokens: Rotate tokens regularly
- Policies: Review policy files for sensitive information before sharing
Thank you for helping keep kspec and its users safe!