| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take security seriously. If you discover a security vulnerability, please follow these steps:
- Open a public GitHub issue
- Discuss the vulnerability publicly before it's fixed
- Exploit the vulnerability beyond what's necessary to demonstrate it
- Email: Send details to admin@jarvispro.io
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Resolution Timeline: Depends on severity, typically 30-90 days
- Credit: We'll credit you in the release notes (unless you prefer anonymity)
- The CLI stores device credentials in the config file
- Config files should have restricted permissions (0600)
- Use environment variables for sensitive data in CI/CD
- OAuth tokens are stored securely in the config
- Tokens are refreshed automatically
- Use
shelly cloud logoutto clear credentials
- Only install plugins from trusted sources
- Plugins execute with the same permissions as the CLI
- Review plugin source code before installation
- Keep Updated: Use the latest version of the CLI
- Secure Config: Ensure config files have proper permissions
- Network Security: Use device authentication when possible
- Audit Plugins: Review installed plugins regularly