Version | Supported |
---|---|
1.0.x | ✅ |
If you discover a security vulnerability in this project, please report it to us privately to give us time to fix it before it becomes public.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via email to: [email protected]
- Description - A clear description of the vulnerability
- Steps to reproduce - How to reproduce the issue
- Impact - What could happen if this vulnerability is exploited
- Suggested fix - If you have any suggestions for fixing the issue
- We will acknowledge receipt of your report within 48 hours
- We will investigate and provide updates on our progress
- Once fixed, we will release a patch and credit you in the release notes
- We will coordinate public disclosure with you
When using this library:
- Always use cryptographically secure random number generators for keys and nonces
- Never reuse nonces - each encryption operation should use a unique nonce
- Keep your keys secure - store them in secure key management systems
- Validate all inputs - ensure data integrity before processing
- Use the latest version - always update to the most recent release
This library implements AES-GCM-SIV (RFC 8452) which provides:
- Misuse resistance - protects against nonce reuse
- Authenticated encryption - ensures data integrity and confidentiality
- Deterministic encryption - same plaintext + key + nonce = same ciphertext