| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in IMIR, please report it by emailing [email protected].
Please do not open a public issue for security vulnerabilities.
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity (critical: 7 days, high: 14 days, medium: 30 days)
IMIR implements the following security practices:
- Dependency Auditing: Automated security audits via
cargo auditin CI - License Compliance: REUSE specification for clear licensing
- Supply Chain: Dependabot for automated dependency updates
- Code Quality: Clippy with
-D warningsenforces security best practices - Memory Safety: Rust's memory safety guarantees prevent common vulnerabilities
Once a vulnerability is fixed:
- Security advisory published on GitHub
- CVE requested if applicable
- Notification sent to users via GitHub release notes
- Credit given to reporter (if desired)