| Version | Supported |
|---|---|
| 0.1.x | Yes |
If you discover a security vulnerability in NeuronPrompter, please report it privately. Do not open a public GitHub issue.
Send an email to: security@neuronprompter.com
Include the following information:
- Description of the vulnerability
- Steps to reproduce or a proof-of-concept
- Affected version(s)
- Potential impact
- Acknowledgment: Within 48 hours of receiving your report
- Assessment: Initial severity assessment within 5 business days
- Fix: Timeline depends on severity:
- Critical (RCE, authentication bypass): patch within 7 days
- High (data exposure, privilege escalation): patch within 14 days
- Medium/Low: addressed in the next scheduled release
NeuronPrompter follows coordinated disclosure:
- The reporter sends the vulnerability details privately.
- The maintainer acknowledges receipt and begins working on a fix.
- A fix is developed and tested before any public disclosure.
- The reporter is credited in the release notes (unless anonymity is requested).
- The vulnerability details are published after the fix is released.
The following are considered security vulnerabilities:
- Remote code execution
- SQL injection
- Authentication or authorization bypass
- Path traversal / directory traversal
- Cross-site scripting (XSS) in the web frontend
- Sensitive data exposure (API keys, tokens, user data)
- Denial of service through resource exhaustion
The following are not in scope:
- Vulnerabilities in third-party dependencies (report these upstream)
- Issues requiring physical access to the machine
- Social engineering attacks