| Version | Status |
|---|---|
| 3.x | Supported |
| < 3.0 | Not supported |
If you discover a security vulnerability, please report it responsibly.
Do not open a public GitHub issue. Instead:
- Visit GitHub Security Advisories
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Initial acknowledgment: 24 hours
- Assessment: 72 hours
- Fix development: 1-2 weeks
- Public disclosure: After fix release
- Keep updated: Run
npm update codicenseregularly - Verify integrity: Check npm package signatures
- Review changes: Inspect lockfile changes in pull requests
- CI/CD integration: Use
--fail-on criticalin production pipelines - Strict mode: Enable
strictMode: truefor regulated environments where only explicit rules apply
CODICENSE is 100% offline:
- No network calls during operation
- No telemetry or data collection
- Deterministic, reproducible results
- All dependencies reviewed for license compliance
- Minimal dependency footprint
- No native modules required
- No sensitive data in error messages
- Error codes for programmatic handling
- Sanitized stack traces in production
| Date | Version | Issue | Severity | Status |
|---|---|---|---|---|
| - | - | No vulnerabilities reported | - | - |
We appreciate responsible disclosure. Security researchers who report valid vulnerabilities will be:
- Credited in release notes (if desired)
- Listed in SECURITY.md acknowledgments
- Security issues: Use GitHub Security Advisories
- General inquiries: GitHub Issues for non-security matters
- GitHub: https://github.com/codicense/codicense