These repositories are primarily documentation and tooling resources. The following versions receive security updates:
| Version | Supported |
|---|---|
Latest main branch |
✅ |
| Older releases | ❌ |
If you discover a security vulnerability in any code within these repositories (scripts, CLI tools, GitHub Actions workflows), please do not include exploit details in a public issue, discussion, or pull request.
Use one of the following channels instead:
- GitHub Private Vulnerability Reporting
Use the Report a vulnerability button in the Security tab of the affected repository, if it is enabled. - Fallback when private reporting is unavailable
Open a minimal public issue with the title prefix[SECURITY]without including reproduction steps, payloads, logs, or exploit details. The issue should only request a private follow-up channel.
Please include, when possible:
- affected repository and file path
- brief description of the issue
- impact assessment
- conditions required to reproduce
- suggested mitigation, if known
- Acknowledgment: within 48 hours
- Initial assessment: within 7 days
- Fix or mitigation: within 30 days for confirmed vulnerabilities, when feasible
Security reports are relevant primarily for:
- Python scripts and CLI tools (
aircpackage and related tooling) - GitHub Actions workflow files
- configuration parsers, validators, and template-generation utilities
Documentation-only repositories (pure Markdown) have a reduced security surface, but unsafe examples, script injection vectors, and dangerous automation guidance are still in scope.
We follow coordinated disclosure. Once a fix is available, we will:
- release a patched version or mitigation
- credit the reporter in the release notes, unless they prefer anonymity
- publish a brief advisory when appropriate