| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| < 0.1 | ❌ |
Wesley takes security seriously, especially when generating production database code.
Please report security vulnerabilities to: security@flyingrobots.dev
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Fix Timeline: Based on severity
- Critical: Within 72 hours
- High: Within 1 week
- Medium: Within 2 weeks
- Low: Next release
Wesley generates SQL with security in mind:
@sensitivefields enforce constraints@piifields trigger RLS recommendations- Password fields require bcrypt constraints
- RLS policies use Supabase Auth functions
- All evidence is SHA-locked
- Bundle files include version numbers
- Migration risk is calculated automatically
- Always review generated SQL before applying to production
- Use @sensitive and @pii directives appropriately
- Enable RLS for multi-tenant applications
- Test migrations in isolated environments first
- Monitor MRI scores - high risk requires manual review
- Automatic bcrypt enforcement for password fields
- RLS policy generation from @rls directives
- PII field detection and warnings
- Migration risk scoring (MRI)
- SHA-locked evidence for audit trails