| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
If you believe you have found a security vulnerability in this project:
- Email: Contact the project maintainer directly
- Include: Description, steps to reproduce, and potential impact
- Response: Expect acknowledgment within 48 hours
We follow responsible disclosure principles and will:
- Acknowledge receipt of your report
- Provide an estimated timeline for a fix
- Notify you when the vulnerability is resolved
- Credit you in the release notes (unless you prefer anonymity)
This repository underwent a security audit before public release. See SECURITY_AUDIT.md for details.
Audit Status: ✅ Passed (2024-12-21)
- Never commit API keys, tokens, or passwords
- Use
.envfiles for local development (template:.env.example) - The
.gitignoreexcludes sensitive files - do not force-add them - Use environment variables:
os.getenv("DEX_API_KEY")
This tool processes personal contact information (PII):
- Database files (
*.db,*.sqlite) - Gitignored, never commit - Report files (
*_REPORT.md) - Gitignored, may contain names/emails - Export files (
*.json,*.csv) - Gitignored, contain contact data - Use
Fakerlibrary for test data, never real contacts
- We use
uvfor dependency management - Run
uv syncto install pinned versions - Regularly audit with
pip-auditorsafety
- Integration tests run against the live Dex API
- Use a test account when possible
- Never record real API keys in test fixtures
- Use
pytest -m "not integration"to skip live tests
| Data Type | Protection |
|---|---|
| API Keys | Environment variables only |
| Contact Data | Local database, gitignored |
| Reports | Generated locally, gitignored |
| Test Data | Faker-generated synthetic data |
.env # Real secrets
*.db, *.sqlite # Databases with PII
*.json, *.csv # Data exports
output/* # Reports directory
*_REPORT.md # Analysis reports
Consider enabling:
- GitHub Secret Scanning - Alerts for exposed secrets
- Dependabot - Dependency vulnerability alerts
- Pre-commit hooks - Local secret detection
# .pre-commit-config.yaml
repos:
- repo: https://github.com/Yelp/detect-secrets
rev: v1.4.0
hooks:
- id: detect-secrets