If you discover a security vulnerability in Devvami, please report it privately rather than opening a public issue.
Do not:
- Open a public GitHub issue
- Disclose the vulnerability in public comments or discussions
- Publish the vulnerability before a fix is available
Do:
- Email the details to: security@devvami.dev (or use GitHub's security advisory form)
- Include a clear description of the vulnerability
- Provide steps to reproduce (if applicable)
- Allow time for a fix before public disclosure (at least 30 days)
- We will acknowledge receipt of your report within 48 hours
- We will assess the severity and impact
- We will work on a fix and release a patched version
- We will credit you in the release notes (unless you prefer anonymity)
- Keep Devvami updated — always use the latest version
- Rotate credentials — if you accidentally expose tokens/keys, rotate them immediately
- Use environment variables — never hardcode secrets in config files
- Enable 2FA — on GitHub and NPM accounts used with Devvami
- Review permissions — only grant necessary scopes for tokens
Security updates are provided for:
- Latest release — always receives security fixes
- Previous minor versions — security fixes only (for 6 months)
- Earlier versions — no security updates (upgrade recommended)
For questions about security, reach out to the maintainers via GitHub Discussions or Issues.