| Version | Supported |
|---|---|
| 1.0.x | ✅ |
We take security seriously. If you discover a security vulnerability in VerifyFetch, please report it responsibly.
Email: security@verifyfetch.com
Please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution Timeline: Depends on severity, typically 30-90 days
- Please give us reasonable time to address the issue before public disclosure
- We will credit reporters in our security advisories (unless you prefer anonymity)
- We do not pursue legal action against researchers who follow responsible disclosure
In scope:
verifyfetchnpm package@verifyfetch/clinpm package- verifyfetch.com website
Out of scope:
- Third-party dependencies (report to their maintainers)
- Social engineering attacks
- Physical attacks
When using VerifyFetch:
- Always verify critical assets - WASM modules, AI models, configuration files
- Use strong algorithms - Prefer SHA-384 or SHA-512 for high-security applications
- Keep manifests in version control - Track changes to integrity hashes
- Run
enforcein CI - Catch tampering before deployment
- v1.0 supports hash verification only (signature verification planned for future release)
- SubtleCrypto fallback loads entire file into memory (use WASM for large files)