We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
The Kleo Network team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings and will make every effort to acknowledge your contributions.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
- Email: Send details to [email protected]
- GitHub Security Advisory: Use the GitHub Security Advisory feature
To help us better understand the nature and scope of the issue, please include as much of the following information as possible:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
After you submit a report, you can expect:
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Assessment: We will assess the vulnerability and determine its impact and severity
- Updates: We will keep you informed about our progress in addressing the vulnerability
- Resolution: We will work on a fix and release it as soon as possible
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: Within 7 days
- High: Within 30 days
- Medium: Within 90 days
- Low: Next scheduled release
Security updates will be released as patch versions (e.g., 1.0.1, 1.0.2) and will be clearly marked in the CHANGELOG.md.
When a security update is released, we will:
- Update the CHANGELOG.md with details
- Create a GitHub Security Advisory
- Tag the release with security information
- Notify users through GitHub release notes
If you're contributing to this project, please follow these security best practices:
- Never commit sensitive data (API keys, passwords, tokens) to the repository
- Use environment variables for all sensitive configuration
- Keep dependencies up to date and monitor for security advisories
- Follow secure coding practices as outlined in CONTRIBUTING.md
- Run security linters before submitting PRs
- Test security features thoroughly
All external links in this application use rel="noopener noreferrer" to prevent:
- Tabnabbing attacks
- Unauthorized access to the
window.openerobject
This application implements Content Security Policy (CSP) headers to prevent:
- Cross-site scripting (XSS) attacks
- Data injection attacks
- Clickjacking
This application should always be served over HTTPS in production to ensure:
- Data encryption in transit
- Authentication of the server
- Data integrity
We use automated tools to monitor our dependencies for known vulnerabilities:
- npm audit: Run regularly to check for vulnerabilities
- Dependabot: Automated dependency updates
- GitHub Security Alerts: Notifications for vulnerable dependencies
To check for vulnerabilities yourself:
npm auditTo fix automatically fixable vulnerabilities:
npm audit fixWe follow the principle of Coordinated Vulnerability Disclosure:
- Security researchers report vulnerabilities privately
- We work together to understand and fix the issue
- We release a fix before public disclosure
- We credit the researcher (if desired)
- Public disclosure happens after users have had time to update
We currently do not have a formal bug bounty program, but we deeply appreciate security researchers who help us keep our users safe. We will:
- Publicly acknowledge your contribution (if desired)
- Provide detailed credit in security advisories
- Consider your contribution in future bounty programs
If you have any questions about this security policy, please contact us at [email protected].
Last Updated: January 7, 2026
Version: 1.0