We take security seriously. The following versions of pacm are currently supported with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in pacm, please report it to us as follows:
Do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
Please include the following information in your report:
- A clear description of the vulnerability
- Steps to reproduce the issue
- Potential impact and severity
- Any suggested fixes or mitigations
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Investigation: We will investigate the report and provide regular updates (at least weekly)
- Fix Development: If confirmed, we will develop and test a fix
- Disclosure: We will coordinate disclosure with you to ensure responsible disclosure
We kindly ask that you:
- Give us reasonable time to fix the issue before public disclosure
- Avoid accessing or modifying user data
- Avoid denial of service attacks
- Avoid spamming our systems
We appreciate security researchers who help keep our users safe. With your permission, we will acknowledge your contribution in our security advisory.
Security updates will be released as soon as possible after a fix is developed and tested. Users should upgrade promptly when security updates are available.
If you have questions about this security policy, please contact us at the email address above.