For version 0.1.1 of UnoPim, we support and provide patches for any security vulnerabilities.
Version | Supported |
---|---|
0.1.1 | ✅ |
If you discover a security vulnerability in any supported version of UnoPim, please do the following:
- Do not open a public issue. Security vulnerabilities should be reported privately to prevent malicious actors from exploiting the issue before it is fixed.
- Send an email to [email protected] with the following information:
- A detailed description of the vulnerability.
- Steps to reproduce the vulnerability, if possible.
- Any potential impacts or exploits you foresee.
- Any other relevant information (e.g., your operating system, UnoPim version, etc.).
We will respond to your report within 72 hours with an acknowledgment of receipt. Further correspondence will be done through email.
Upon receiving a security vulnerability report for version 0.1.1 of UnoPim, we will follow these steps:
- Acknowledgment: We will acknowledge receipt of the vulnerability report within 72 hours.
- Investigation: We will investigate the reported vulnerability and determine its impact and severity.
- Mitigation Plan: We will develop a plan to mitigate the vulnerability, which may involve code changes, configuration adjustments, or other measures.
- Patch Development: We will develop and test a patch to fix the vulnerability.
- Release: We will release the patch as part of a new version of UnoPim. Release notes will include information about the vulnerability, credit to the reporter (if they wish to be credited), and any necessary steps for users to update.
We prefer vulnerability reports to be written in English.
We appreciate your efforts to help improve the security of UnoPim. Thank you for working with us to keep our users safe.