We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of http-cli seriously. If you discover a security vulnerability, please follow these steps:
Please do not open public GitHub issues for security vulnerabilities, as this could put users at risk.
Preferred Method: Use GitHub's Security Advisory feature:
- Navigate to the Security tab
- Click "Report a vulnerability"
- Provide detailed information about the vulnerability
Alternative Method: Email us directly at:
- Email: sadeem@sadeem.uk *
- Subject:
[SECURITY] http-cli vulnerability report
To help us triage and respond quickly, please include:
- Vulnerability Type (e.g., injection, authentication bypass, information disclosure)
- Affected Component (e.g., scanner module, RBAC checker, compliance reporter)
- Affected Versions (which versions are vulnerable)
- Impact Assessment (what an attacker could achieve)
- Proof of Concept (steps to reproduce, code snippets, or screenshots)
- Suggested Fix (if you have one)
- Your Contact Information (for follow-up questions)
- Acknowledgment: Within 48 hours of report submission
- Initial Assessment: Within 5 business days
- Patch Development: Varies by severity, typically 7-30 days
- Public Disclosure: After patch is released and users have time to update
- Validation: We verify and reproduce the reported vulnerability
- Patch Development: We develop and test a fix
- Advisory Creation: We create a security advisory (CVE if applicable)
- Release: We publish a patched version
- Notification: We notify users via GitHub releases and security advisories
- Public Disclosure: We coordinate disclosure with the reporter
We follow Coordinated Disclosure:
- We request a 90-day embargo before public disclosure
- We will credit security researchers in the advisory (unless you prefer anonymity)
- We encourage responsible disclosure and will not pursue legal action against good-faith researchers
When using http-cli for security testing:
- Always obtain explicit permission before scanning any systems you don't own
- Use
-audit-logto maintain accountability records - Enable
-redactwhen sharing scan outputs to avoid leaking sensitive data - Keep the tool updated to the latest version
- Review compliance reports and remediate findings promptly
- Never scan production systems without proper authorization and change control
This tool includes several security features:
- Audit Logging: Cryptographically signed logs (
-audit-log) - Data Redaction: Automatic masking of secrets (
-redact) - Compliance Mapping: Maps findings to PCI DSS, HIPAA, GDPR
- Zero-Trust Validation: Checks for modern security architecture
- Sensitive Data Detection: Identifies leaked credentials, PII, and PHI
We appreciate security researchers who help improve http-cli:
No security vulnerabilities have been reported yet.
Last Updated: 2026-01-23
Contact: m.elqrwash AT gmail