We actively support the following versions of TomlEv with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| 0.9.x | ❌ |
| < 0.9 | ❌ |
We take security vulnerabilities seriously. Please follow these steps to report security issues:
Please do not report security vulnerabilities through public GitHub issues.
Instead, please send an email to: m+security@bubelich.com
Include the following information:
- Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
- Initial Response: Within 48 hours of receiving your report
- Status Update: Within 1 week with an estimated timeline for fixes
- Resolution: Security patches will be prioritized and released as soon as possible
When using TomlEv in production:
- Input Validation: Always validate configuration data from untrusted sources
- File Permissions: Ensure configuration files have appropriate read permissions
- Environment Variables: Be cautious with sensitive data in environment variables
- Regular Updates: Keep TomlEv updated to the latest version
- Dependency Scanning: Regularly scan dependencies for known vulnerabilities
TomlEv includes several security features:
- Input Sanitization: Automatic validation of configuration types
- Path Traversal Protection: Safe file path handling
- Strict Mode: Optional strict validation to catch configuration errors
- Type Safety: Strong typing prevents many common security issues
We employ multiple layers of security testing:
- Static Analysis: Automated code scanning with Bandit
- Dependency Scanning: Regular vulnerability scans with Safety
- Code Review: All changes undergo security-focused code review
- Fuzzing: Property-based testing with Hypothesis
We follow responsible disclosure practices and ask that you:
- Give us reasonable time to investigate and fix the issue before public disclosure
- Avoid privacy violations, destruction of data, and disruption of services
- Only interact with accounts you own or have explicit permission to access
We maintain a security researchers hall of fame for those who responsibly disclose vulnerabilities. Contributors will be acknowledged (with permission) in:
- Release notes for the fixed version
- Security advisory documentation
- Project README (optional)
Thank you for helping keep TomlEv and our users safe!