We release patches for security vulnerabilities. Currently supported versions:
< /dev/null | Version | Supported | | ------- | ------------------ | | 1.0.x | ✅ | | < 1.0 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability, please report it by emailing:
Please include the following information:
- Type of vulnerability (e.g., buffer overflow, SQL injection, cross-site scripting)
- Full paths of source file(s) related to the manifestation of the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability, including how an attacker might exploit it
- Initial Response: Within 48 hours
- Status Update: Within 5 business days
- Resolution Timeline: Based on severity
- Critical: 7-14 days
- High: 14-30 days
- Medium: 30-60 days
- Low: 60-90 days
When using this library:
-
API Key Management
- Never hardcode API keys in your source code
- Use iOS Keychain for storing sensitive credentials
- Rotate API keys regularly
- Use separate keys for development and production
-
Environment Configuration
- Always use production endpoints for live transactions
- Ensure certification mode is disabled in production builds
- Implement proper environment detection
-
Network Security
- The library enforces TLS 1.2+ for all communications
- Consider implementing certificate pinning for additional security
- Monitor for suspicious network activity
-
Data Handling
- Never log full card numbers or CVV codes
- The library automatically clears sensitive data from memory
- Implement rate limiting for tokenization requests
- Sanitize all error messages shown to users
This library is designed to help reduce PCI DSS scope by:
- Never storing card data
- Transmitting data only to certified tokenization endpoints
- Returning only tokens, never raw card data
- Implementing secure coding practices
Security updates will be released as:
- Patch versions for non-breaking security fixes
- Minor versions if security fixes require API changes
Monitor our releases page for security updates: https://github.com/datacapsystems/Datacap-MobileToken-iOS-Library-2025/releases
For urgent security matters, contact:
- Email: [email protected]
- Support: [email protected]
We appreciate security researchers who responsibly disclose vulnerabilities. Acknowledgment will be given in release notes unless anonymity is requested.