We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 0.11.x | ✅ |
| < 0.11 | ❌ |
We take the security of Links Notation seriously. If you believe you have found a security vulnerability in any of our implementations (JavaScript, Python, Rust, or C#), please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please email us at: [email protected]
You should receive a response within 48 hours. If for some reason you do not, please follow up to ensure we received your original message.
Please include the following information in your report:
- Type of issue (e.g. buffer overflow, injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
This information will help us triage your report more quickly.
We prefer all communications to be in English.
- The security report is received and assigned to a handler
- The problem is confirmed and a list of affected versions is determined
- Code is audited to find any similar problems
- Fixes are prepared for all supported versions
- Fixes are released as quickly as possible
If you have suggestions on how this process could be improved, please submit a pull request.