| Version | Supported |
|---|---|
| 0.2.x | Yes |
| < 0.2 | No |
Do not open a public GitHub issue for security vulnerabilities.
Email security@macropulse.live with:
- A clear description of the vulnerability
- Steps to reproduce
- Affected versions
- Potential impact
You will receive an acknowledgement within 48 hours.
In scope:
- Ed25519 signature verification logic (
heartbeat.rsequivalent in the Python client) - Token/API key exposure via logs or exception messages
- Insecure default TLS behavior
Out of scope:
- Issues in
httpxorcryptographyupstream packages (report upstream)