| Version | Supported |
|---|---|
| 1.x | ✅ |
| < 1.0 | ❌ |
Please do NOT report security vulnerabilities through public GitHub issues.
- Navigate to the Security tab of this repository
- Click "Report a vulnerability"
- Fill out the advisory form with:
- Detailed description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if known)
We will respond within 48 hours and provide regular updates on the status.
If you prefer email, send reports to: security@vibecoding.labs (replace with your actual email)
Include:
- Vulnerability description
- Reproduction steps
- Impact assessment
- Your contact information (for follow-up)
- Acknowledgment: Within 48 hours
- Triage: 1-3 business days
- Fix Development: Based on severity
- Critical: 1-7 days
- High: 7-14 days
- Medium: 14-30 days
- Low: 30-90 days
- Release: Security patch + advisory published
- Disclosure: 90 days after fix (or sooner if agreed)
When using this template:
- ✅ Always use
.envfiles for secrets (never commit) - ✅ Enable Dependabot alerts
- ✅ Use GitHub secret scanning
- ✅ Keep dependencies updated
- ✅ Follow principle of least privilege
- ✅ Review CODEOWNERS carefully
We currently do not offer a bug bounty program, but we deeply appreciate responsible disclosure and will credit researchers in our security advisories (with permission).
None yet. This section will list historical vulnerabilities and their CVE IDs.
Last Updated: 2026-03-05
Contact: security@vibecoding.labs