We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 2.2.x | ✅ |
| 2.1.x | ✅ |
| < 2.0 | ❌ |
If you discover a security vulnerability within the AL Development Collection, please follow these steps:
Please do not create a public GitHub issue for security vulnerabilities.
Send a detailed report via GitHub Security Advisory or email to javiarmesto [at] gmail.com
Include in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (if available)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: Within 7 days
- High: Within 30 days
- Medium/Low: Next scheduled release
- We will confirm receipt of your report
- We will investigate and validate the issue
- We will develop and test a fix
- We will release a security patch
- We will publicly acknowledge your contribution (if desired)
When using this collection:
- Review Instructions: Always review auto-applied instructions before accepting generated code
- Validate Prompts: Verify that prompts match your security requirements
- Sensitive Data: Never include credentials, tokens, or sensitive data in instruction files
- Access Control: Use GitHub's access controls for private repositories
- Dependencies: Keep dependencies updated (run
npm auditregularly)
This security policy applies to:
- All instruction files (
.instructions.md) - All agentic workflows (
.prompt.md) - All agents (
.agent.md) - Collection manifest files
- Validation scripts
- Issues with GitHub Copilot itself (report to GitHub)
- Issues with VS Code (report to Microsoft)
- Microsoft Dynamics 365 Business Central vulnerabilities (report to Microsoft)
- General AL development questions (use Discussions instead)
We appreciate responsible disclosure and will acknowledge security researchers who help improve the security of this project.
Thank you for helping keep the AL Development Collection and our users safe!