We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
We take the security of VersionMark seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them using one of the following methods:
- Preferred: GitHub Security Advisories - Use the private vulnerability reporting feature
- Alternative: Contact the project maintainers directly through GitHub
Please include the following information in your report:
- Type of vulnerability (e.g., SQL injection, cross-site scripting, etc.)
- Full path of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
After submitting a vulnerability report, you can expect:
- Acknowledgment: We will acknowledge receipt of your vulnerability report promptly
- Investigation: We will investigate the issue and determine its impact and severity
- Updates: We will keep you informed of our progress as we work on a fix
- Resolution: Once the vulnerability is fixed, we will:
- Release a security patch
- Publicly disclose the vulnerability (with credit to you, if desired)
- Update this security policy as needed
- Initial Response: Promptly
- Status Update: Regular updates as investigation progresses
- Fix Timeline: Varies based on severity and complexity
Security updates will be released as:
- Critical vulnerabilities: Patch release as soon as possible
- High severity: Patch release within 30 days
- Medium/Low severity: Included in the next regular release
When using VersionMark, we recommend following these security best practices:
- Validate configuration files (.versionmark.yaml) before processing
- Be cautious when using untrusted configuration files
- Use the latest version of VersionMark to benefit from security updates
- Keep VersionMark and its dependencies up to date
- Review the release notes for security-related updates
- Use
dotnet list package --vulnerableto check for vulnerable dependencies
- Run VersionMark with the minimum required permissions
- Avoid running VersionMark as a privileged user unless necessary
- Review configuration files for potentially dangerous commands before execution
VersionMark executes shell commands defined in the configuration file to capture version information. Users should:
- Review the
.versionmark.yamlconfiguration file before use - Be cautious when using configuration files from untrusted sources
- Understand that commands are executed with the same permissions as the VersionMark process
- Validate that commands in the configuration file are safe to execute
- Avoid executing commands that could modify system state or access sensitive data
VersionMark reads and writes files on the local file system. Users should:
- Ensure appropriate file permissions are set on output files (JSON and markdown)
- Be cautious when writing files in shared directories
- Validate that glob patterns used in publish mode do not inadvertently process sensitive files
- Review generated markdown files before committing to version control
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release patches as soon as possible
We will credit security researchers who report vulnerabilities responsibly. If you would like to be credited:
- Provide your name or pseudonym
- Optionally provide a link to your website or GitHub profile
- Let us know if you prefer to remain anonymous
VersionMark relies on third-party packages. We:
- Regularly update dependencies to address known vulnerabilities
- Use Dependabot to monitor for security updates
- Review security advisories for all dependencies
To check for vulnerable dependencies yourself:
dotnet list package --vulnerableFor security concerns, please use GitHub Security Advisories or contact the project maintainers directly through GitHub.
For general bugs and feature requests, please use GitHub Issues.
Thank you for helping keep VersionMark and its users safe!