The stability of the BeyteFlow ecosystem is our top priority. We take digital security seriously and appreciate the efforts of security researchers in keeping our "bytes" safe.
We actively provide security patches for the following versions of our core systems:
| Version | Supported |
|---|---|
| 2.0.x | ✅ Active |
| 1.5.x | |
| < 1.4 | ❌ End of Life |
If you discover a security glitch or a potential breach in the flow, please do not open a public issue. Publicly disclosing a vulnerability could put the entire ecosystem at risk.
- Intercept & Encrypt: Draft a detailed report of the vulnerability.
- Secure Transmission: Email your findings to security@beyteflow.dev (or your primary contact email).
- Response Time: Our core maintainers will acknowledge your report within 48 hours and provide a timeline for a fix.
- A detailed description of the vulnerability.
- Steps to reproduce the exploit (Proof of Concept).
- Potential impact on the system or user data.
While we may not always offer financial rewards, we maintain a Hall of Fame for researchers who help stabilize our architecture. Valid reports will be credited in our release notes and changelogs.