Thank you for your interest in helping make Dataphyre secure! We take security seriously and appreciate any efforts to help identify vulnerabilities. If you believe you've discovered a security issue, please follow the steps below to report it:
-
Do Not Create Issues: Please do not create GitHub issues to report security vulnerabilities. This keeps the information confidential and reduces the risk of exploitation.
-
Contact Us: Send a detailed description of the vulnerability to our security team via email at [email protected]. Include the following information:
- A clear description of the vulnerability.
- Steps to reproduce the issue (if applicable).
- The potential impact of the vulnerability.
- Any relevant proof of concept or evidence.
-
Response Timeline: We will acknowledge your report within 48 hours and aim to provide a full response, including mitigation or a timeline for a fix, within 7 days. We appreciate your patience as we investigate and address the issue.
We strive to keep the Dataphyre framework secure by regularly updating dependencies and addressing any identified vulnerabilities. Subscribe to our repository to receive notifications about security updates and patches.
To further enhance the security of your application using Dataphyre, consider the following best practices:
- Keep your Dataphyre installation and all dependencies up to date.
- Regularly review security settings and configurations in your environment.
- Implement secure coding practices to avoid common vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF).
- Utilize security-focused tools and libraries that complement Dataphyre.
We thank all security researchers and users who report vulnerabilities responsibly. We will publicly acknowledge your contribution in the release notes or a dedicated security acknowledgments section if you wish.
While we take every reasonable effort to address reported vulnerabilities, please be aware that no software can be guaranteed to be entirely free of vulnerabilities. Users are encouraged to conduct their own security assessments and audits of the software they deploy.
For any questions regarding our security policy or to discuss potential security improvements, feel free to reach out to us at [email protected].