We take security seriously and actively maintain security updates for the following versions:
| Version | Supported |
|---|---|
| 0.1.4+ | ✅ |
| < 0.1.4 | ❌ |
Note: Versions below 0.1.3 lack many features that have been updated, improved, or removed. We strongly recommend always using the latest version for the best experience and security.
If you discover a security vulnerability in Logly, please help us by reporting it responsibly.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
- Email: contact@muhammadfiaz.com
- Subject: [SECURITY] Logly Vulnerability Report
When reporting a security vulnerability, please include:
- Description: A clear description of the vulnerability
- Impact: What an attacker could achieve by exploiting this vulnerability
- Steps to Reproduce: Detailed steps to reproduce the issue
- Affected Versions: Which versions of Logly are affected
- Mitigation: Any suggested fixes or workarounds (optional)
- We will acknowledge receipt of your report within 48 hours
- We will provide a more detailed response within 7 days indicating our next steps
- We will keep you informed about our progress throughout the process
- We will credit you (if desired) once the vulnerability is fixed
- Once we have confirmed and fixed a vulnerability, we will:
- Release a security advisory on GitHub
- Update the changelog with details about the fix
- Credit the reporter (with permission)
When using Logly in production:
- Keep Dependencies Updated: Regularly update Logly and its dependencies
- Log Sanitization: Be cautious with sensitive data in log messages
- Access Control: Limit access to log files and configuration
- Monitor Logs: Implement monitoring for suspicious logging activity
- Environment Variables: Use environment variables for sensitive configuration
For security-related questions or concerns, please use the contact information above rather than creating public issues.