dynos_sync is built with a Security-First philosophy. We appreciate the research and testing performed by the data security community to help us maintain a high-reliability synchronization ecosystem.
| Version | Supported |
|---|---|
| 0.1.x | β Active Support |
| < 0.1.x | β End of Life |
DO NOT OPEN A GITHUB ISSUE for suspected security vulnerabilities.
Please report suspected vulnerabilities directly via the Project Repository's 'Security' tab (Private Reporting) or by contacting the maintainer via the secure email listed in the profile.
We investigate all reports and aim to provide a remediation plan within 48 hours.
We are particularly interested in reports covering:
- Cross-User Data Leaks: Evidence of data surviving logout or leaking into separate auth sessions.
- PII Exfiltration: Evidence of sensitive fields bypassing the
redactionlayer into logs or telemetry. - Sync-Queue Hijacking: Forged writes or unauthorized push attempts.
- SQL Injection: Bypass of the literal-string hardening in Drift/SQL stores.
- Acknowledgment: 24-48 hours.
- Investigation: 2-5 business days.
- Patch & Advisory: Vulnerabilities will be patched in a minor release, followed by a public Security Advisory describing the fix.
Thank you for helping us keep dynos_sync production-hardened! π’π±