VivanceData takes the security of our software and services seriously. This security policy outlines how we handle vulnerabilities and what you can expect when reporting security issues.
If you believe you've found a security vulnerability in any VivanceData-owned repository, please report it to us through the following channels:
Email: security@vivancedata.com
Subject line: [Security] Brief description of the issue
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
When you report a vulnerability to VivanceData:
- We will acknowledge receipt of your vulnerability report within 48 hours.
- Our security team will investigate and validate the issue.
- We will provide regular updates about our progress.
- Once the issue is resolved, we will notify you and recognize your contribution (if desired).
- VivanceData follows a coordinated disclosure model.
- We request that you do not publicly disclose the vulnerability until we have released a fix.
- We aim to resolve critical vulnerabilities within 30 days of verification.
- After the vulnerability has been fixed, we will publish a security advisory through GitHub's security advisory feature.
| Version | Supported |
|---|---|
| 2.x.x | ✅ |
| 1.x.x | ✅ |
| < 1.0 | ❌ |
Only the latest minor release of each major version will receive security updates.
When using VivanceData projects, we recommend the following security best practices:
- Keep dependencies up to date with the latest security patches
- Use the latest stable version of our software
- Follow security guidelines provided in project documentation
- Implement proper authentication and authorization in your implementations
- Regularly audit your own code that integrates with our products
VivanceData implements the following security measures in our development process:
- Regular security audits and dependency scanning
- Static code analysis for common vulnerabilities
- CI/CD pipeline with security checks
- Peer code review for all changes
- Regular security training for our development team
Thank you for helping us keep VivanceData and our users secure!