| Version | Supported |
|---|---|
| 0.1.x | Yes |
If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public issue.
- Email the maintainers or use GitHub's private vulnerability reporting.
- Include a description of the vulnerability, steps to reproduce, and any potential impact.
- You will receive an acknowledgment within 48 hours.
We will work with you to understand and address the issue before any public disclosure.
- Secrets at rest: Integration secrets are encrypted with AES-256-GCM via
ENCRYPTION_KEY - Database: Always use parameterized queries (tagged template literals via
postgreslibrary) - Permissions: Tool execution is gated by the SDK's permission system
- Environment: Never commit
.envfiles — use.env.exampleas a reference