| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability within DUMBL, please follow these steps:
- Do not open a public GitHub issue
- Send an email to the maintainer through neosdev.io
- Include as much information as possible:
- Type of vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
You can expect:
- Acknowledgment within 48 hours
- Regular updates on the progress
- Credit in the fix announcement (unless you prefer to remain anonymous)
When using DUMBL:
- Keep the package updated to the latest version
- Validate input before compression if accepting user data
- Don't compress sensitive data (passwords, tokens, etc.) that shouldn't be logged