Use this section to tell people about which versions of your project are currently being supported with security updates.
Version | Supported |
---|---|
1.0.x | ✅ |
< 1.0 | ❌ |
If you discover a security vulnerability within KMCView, please send an email to [INSERT_EMAIL]. All security vulnerabilities will be promptly addressed.
Please include the following information in your report:
- Type of issue (buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the vulnerability
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
This information will help us triage your report more quickly.
When using KMCView:
- Keep dependencies updated: Regularly update your Python packages
- Validate input data: Ensure your KMC output files are from trusted sources
- Use virtual environments: Isolate your project dependencies
- Review code: If you're using a custom version, review the code for security issues
When we receive a security bug report, we will:
- Confirm the problem and determine the affected versions
- Audit code to find any similar problems
- Prepare fixes for all supported versions
- Release new versions with the fixes
- Publicly announce the vulnerability
We would like to thank all security researchers who responsibly disclose vulnerabilities to us.