We actively support the following versions of inqwise-walker with security updates:
| Version | Supported |
|---|---|
| 1.1.x | ✅ |
| 1.0.x | ✅ |
| < 1.0 | ❌ |
This project uses multiple security scanning tools to identify and address vulnerabilities:
- Snyk (Free Tier): Scans dependencies for known vulnerabilities - unlimited for public repos
- OWASP Dependency Check (Open Source): Identifies vulnerable components using CVE database
- GitHub Dependabot (Free): Automated dependency updates with security patches
- GitHub CodeQL (Free for Public): Static analysis for code security issues
We take security vulnerabilities seriously. If you discover a security vulnerability, please follow these steps:
- DO NOT open a public GitHub issue
- Email us directly at: security@inqwise.com
- Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 5 business days
- Status Updates: Weekly until resolved
- Resolution: Target 30 days for critical issues
- We will acknowledge your contribution in our security advisories
- We may offer recognition on our website or documentation
- For significant vulnerabilities, we may provide a monetary reward
When using inqwise-walker in your projects:
-
Keep Dependencies Updated
- Regularly update to the latest version
- Monitor security advisories
- Use dependency scanning tools
-
Input Validation
- Validate all input data before walking
- Sanitize data from untrusted sources
- Implement proper error handling
-
Access Control
- Limit access to sensitive object structures
- Use appropriate authentication and authorization
- Follow principle of least privilege
-
Performance Impact
- Be aware of potential DoS through deeply nested objects
- Implement appropriate timeouts and limits
- Monitor resource usage during walking operations
-
Data Exposure
- Be careful when logging or outputting walked data
- Sanitize sensitive information in error messages
- Implement proper data masking for sensitive fields
All production dependencies are scanned for vulnerabilities:
- Vert.x Core (provided scope)
- Google Guava (provided scope)
- Apache Log4j API (required)
- Inqwise Difference (provided scope)
Test dependencies are also monitored but have lower priority for security patches.
For security-related questions or concerns:
- Email: security@inqwise.com
- Response Time: Within 48 hours
- PGP Key: Available upon request
Security updates are distributed through:
- GitHub Releases: Security patches in new versions
- Security Advisories: GitHub Security Advisory database
- Documentation: Updates to this security policy
- Notifications: GitHub watch notifications for security updates
This security policy was last updated: October 2024