| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities
- Email your findings to: security@flow-profile.dev (or the repository owner)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability within 7 days
- Resolution: Critical issues will be prioritized for immediate patching
- Disclosure: We follow responsible disclosure practices
This security policy applies to:
@flow-profile/core- Core parsing and analysis library@flow-profile/cli- Command-line interface@flow-profile/ui- UI component library@flow-profile/ai- AI integration adaptersapps/web- Web application
- Vulnerabilities in third-party dependencies (report to upstream)
- Issues that require physical access to the user's machine
- Social engineering attacks
When using Flow Profile:
- Never commit secrets: Flow Profile detects high-entropy strings that may be secrets. Remove them before sharing flows.
- Review AI context: The generated context may include sensitive flow configuration. Review before sharing with AI assistants.
- Keep dependencies updated: Run
bun updateregularly to get security patches.
We appreciate security researchers who help keep Flow Profile safe. With your permission, we will acknowledge your contribution in our release notes.