Use this section to tell people about which versions of your project are currently being supported with security updates.
Version | Supported |
---|---|
1.0.x | ✅ |
< 1.0 | ❌ |
We take the security of Clixor seriously. If you have discovered a security vulnerability, please follow these steps:
- Do not disclose the vulnerability publicly.
- Send a description of the vulnerability to clixor-security@youssefbaghr.github.com
- Provide as much information as possible, including:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
We will acknowledge receipt of your vulnerability report and send you regular updates about our progress. If you have not received a response to your email within 48 hours, please follow up to ensure we received your original message.
Thank you for helping to keep Clixor and our users safe!