| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities via email to: security@servo.dev
Please include:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting)
- Full paths of source file(s) related to the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue
We will respond within 48 hours and aim to fix critical vulnerabilities within 7 days.
When using Servo:
- Never commit credentials to version control
- Use Workload Identity/IAM roles instead of static credentials
- Enable encryption at rest and in transit
- Keep dependencies updated (use Dependabot)
- Follow least privilege principle for service accounts
- Enable audit logging in production
- Use VPC/private subnets for databases
Security updates will be released as patch versions and announced via:
- GitHub Security Advisories
- Email to security mailing list (subscribe at security@servo.dev)
- Discord #announcements channel