| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability in lldap-cli, please report it responsibly:
- Do not open a public GitHub issue for security vulnerabilities
- Email the maintainer directly or use GitHub's private vulnerability reporting
- Include a detailed description of the vulnerability
- Provide steps to reproduce if possible
- Acknowledgment: Within 48 hours
- Initial assessment: Within 7 days
- Fix timeline: Depends on severity, typically within 30 days
lldap-cli includes the following security measures:
- Input validation: All user inputs are validated for length and dangerous characters
- Rate limiting: Exponential backoff on 429 responses (max 3 retries)
- Session timeout: 30-minute inactivity timeout clears tokens
- Password complexity: 8-128 characters, must contain letters and numbers
- Path traversal protection: File paths are validated and normalized
- Sensitive data redaction: Tokens and passwords are redacted in debug output
When using lldap-cli:
- Use environment variables or config files for credentials, not command-line arguments
- Use token-based authentication (
LLDAP_TOKEN) for automation rather than passwords - Regularly rotate credentials
- Run with minimal required permissions