In case you observe any potential vulnebrality in packages released under this organization please contact us on
support@wanted.solutions
.
- Packages Versioning
- Reporting a Vulnebrality
- Handling Vulnebralities
- Security Updates
- Security Best Practices
- Contact
All of our packages are using Semantic versiong
. We release patches for security vulnerabilities for all stable versions of our public packages, all repositories are also scanned for depedency vulnebraties continously. Vulnerable versions are marked as deprecated.
If you discover a security vulnerability, please report it to us by sending an email to support@wanted.solutions
. Please include the following details with your report:
- A description of the vulnerability
- Steps to reproduce the vulnerability
- Any potential impact or exploit scenarios
- Any relevant screenshots or logs
We will respond to your report within 72 hours with an acknowledgment and will work with you to understand and address the issue promptly. We ask that you do not disclose the vulnerability publicly until we have had a chance to address it.
Once a vulnerability is reported, we will follow these steps:
- Acknowledgment: We will acknowledge receipt of the vulnerability report within 72 hours.
- Investigation: We will investigate the vulnerability to understand its impact and scope.
- Mitigation: We will develop a fix or mitigation for the vulnerability.
- Communication: We will communicate the fix or mitigation to the reporter and, if necessary, to the public.
- Release: We will release a patch or update to address the vulnerability.
- Post-Mortem: We will conduct a post-mortem to understand how the vulnerability occurred and how we can prevent similar issues in the future.
We will release security updates as necessary. When a security update is released, we will notify users through our GitHub repository and other appropriate channels. Users are encouraged to keep their software up to date to ensure they have the latest security patches.
We encourage all users and contributors to follow these security best practices:
- Keep your software up to date with the latest security patches.
- Use strong, unique passwords for all accounts.
- Enable two-factor authentication (2FA) where possible.
- Regularly review and audit your security settings and configurations.
- Be cautious of phishing attempts and other social engineering attacks.
- Use secure communication channels for sensitive information.
If you have any questions or need further assistance, please contact us at support@wanted.solutions
.
Thank you for helping us keep WANTED.solutions open source secure!
2024 © All rights reserved - WANTED.solutions s.r.o. <@wanted-solutions>