| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in altpg, please report it by:
- DO NOT open a public GitHub issue
- Email the maintainer at: Create a private security advisory
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge your email within 48 hours and provide a detailed response within 7 days.
When using altpg:
- Never commit credentials - Use environment variables or secure credential management
- Use parameterized queries - Always use parameter binding to prevent SQL injection
- Keep dependencies updated - Regularly update altpg and PostgreSQL
- Use SSL/TLS connections - Enable SSL for production databases
- Limit database privileges - Use least-privilege principle for database users
- Validate input - Always validate and sanitize user input before using in queries
- Monitor connections - Use connection pooling and monitor for anomalies
- Audit access - Keep logs of database access and modifications
- This is an early-stage project (v0.1.x) and may not have undergone comprehensive security audits
- Parameter binding implementation is still being enhanced
- Error messages may contain sensitive information - be careful in production logging
When a security vulnerability is reported:
- We will confirm receipt within 48 hours
- We will investigate and provide a timeline for fixes
- We will release a patch as soon as possible
- We will publish a security advisory after the fix is released
- We will credit the reporter (unless they wish to remain anonymous)
Security updates will be:
- Released as patch versions (e.g., 0.1.1)
- Announced in CHANGELOG.md
- Tagged as security updates in releases
- Communicated via GitHub security advisories
For security-related questions or concerns:
- GitHub Security Advisories: Create Advisory
- General questions: Open an Issue