| Version | Supported |
|---|---|
| 0.x | ✅ |
If you discover a security vulnerability within smslib, please follow our responsible disclosure process:
-
DO NOT create a public GitHub issue
-
Email mrmeaow@pm.me with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
-
We aim to respond within 48 hours
-
Once validated, we will:
- Acknowledge receipt
- Work on a fix
- Request CVE assignment if applicable
- Publish security advisory on GitHub
When using smslib:
- Never commit API keys or credentials to version control
- Use environment variables for sensitive configuration
- In production, use HTTPS for all API communications
- Regularly rotate API keys/secrets
- Follow the principle of least privilege for access tokens
We use pnpm audit to regularly check for vulnerabilities in dependencies. Run locally:
pnpm audit