| Version | Supported |
|---|---|
| main | ✅ |
| 0.1.x | ✅ |
| < 0.1 | ❌ |
We provide security updates for the latest release and the main branch. Older versions are not supported.
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
- Do NOT file a public GitHub issue for security vulnerabilities
- Email: Send details to
security@star.ga - Alternative: Contact the repo owner (@cputer) directly via GitHub's private vulnerability reporting
- Description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Any suggested fixes (optional)
| Stage | Timeline |
|---|---|
| Initial acknowledgment | Within 48 hours |
| Preliminary assessment | Within 7 days |
| Fix development | Within 30 days (severity dependent) |
| Public disclosure | After fix is released |
- We follow coordinated disclosure practices
- Credit will be given to reporters (unless anonymity is requested)
- We aim to release fixes before public disclosure
- Critical vulnerabilities may receive expedited handling
When using MIND in production (as a dependency in your own applications):
- Pin dependencies: Commit your application's
Cargo.lockto ensure reproducible builds - Verify checksums: Validate release artifacts before deployment
- Sandbox execution: Run compiled MIND programs in isolated environments
- Audit inputs: Validate all external data before processing
- Update regularly: Keep MIND and dependencies up to date
cargo deny checkruns on all PRs for license and advisory checks- Clippy with
-D warningsenforces safe Rust patterns - No
unsafecode in core compiler paths
This security policy covers:
- The MIND compiler (
mindc) - The MIND interpreter (
mind) - Core library (
src/) - Build tooling and CI
Out of scope:
- Third-party dependencies (report to upstream)
- The proprietary
mind-runtime(separate policy) - Example code and documentation
- Security issues:
security@star.ga - General inquiries:
info@star.ga - Repository owner: @cputer