| Version | Supported |
|---|---|
| 1.0.x | ✅ |
Because vulnz is a security tool, we take security seriously. If you discover a security vulnerability, please follow responsible disclosure:
- Do NOT open a public GitHub issue -- this could expose users to risk
- Use GitHub Security Advisories -- Go to the Security tab and click "Report a vulnerability"
- Or email directly -- Contact the maintainer at shift+vulnz@someone.section.me with the subject line:
[SECURITY] vulnz: <brief description>
- A clear description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if applicable)
- Acknowledgment: Within 48 hours of your report
- Status updates: Every 5 business days while we investigate
- Resolution timeline: We aim to resolve critical issues within 7 days
- Credit: We will publicly credit reporters (unless you prefer to remain anonymous)
Security issues may include:
- Remote code execution through malicious input data
- Path traversal vulnerabilities in archive extraction
- Credential leakage in logs or error messages
- Denial of service through resource exhaustion
- Supply chain attacks through compromised dependencies
- Upstream data source issues (NVD, ENISA, etc.)
- Known limitations documented in README
- Issues in development dependencies not shipped in binaries
- Always run vulnz with the latest version
- Use a dedicated API key for NVD access (set
NVD_API_KEYenvironment variable) - Review workspace directories periodically for orphaned files
- Run in a containerized or sandboxed environment when processing untrusted data sources
For non-security questions, open a regular GitHub issue or contact the maintainer.