| Version | Supported |
|---|---|
| 2.x | Yes |
| < 2.0 | No |
If you discover a security vulnerability in DrawTool, please report it responsibly:
- Do not open a public GitHub issue.
- Email the maintainer at the address listed in the repository profile, or use GitHub's private vulnerability reporting feature (Security tab > "Report a vulnerability").
- Include:
- Description of the vulnerability
- Steps to reproduce
- Affected version(s)
- Suggested fix (if any)
You can expect an initial response within 7 days. Confirmed issues will be patched in a point release and credited in the changelog unless you prefer to remain anonymous.
DrawTool is a local desktop application. The primary attack surface is
malicious SVG or .dtxt script files. The project runs CI with
AddressSanitizer and UndefinedBehaviorSanitizer to catch memory safety
issues early.