Please do not open a public GitHub issue for security vulnerabilities.
Instead, please report security issues responsibly by:
- Email - Contact the maintainers directly (if contact info is provided)
- GitHub Security Advisory - Use the "Report a vulnerability" option under Security tab
- Private Message - Reach out to maintainers via private channels if available
When reporting a vulnerability, please provide:
- Description - Clear explanation of the security issue
- Affected Versions - Which versions are affected?
- Steps to Reproduce - How can we verify the vulnerability?
- Impact - What's the potential impact if exploited?
- Suggested Fix - Do you have any ideas for fixing it?
- Proof of Concept - Example code that demonstrates the issue (if safe)
- Acknowledgment - We'll acknowledge receipt within 48 hours
- Investigation - We'll work to understand and reproduce the issue
- Fix - We aim to release a fix within 30 days
- Disclosure - We'll coordinate a responsible disclosure timeline with you
When using Sloth Python:
- Never commit secrets (API keys, passwords, tokens) to the repository
- Use
.envfiles (git-ignored) for local development - Use GitHub Secrets for CI/CD pipelines
- Rotate secrets regularly
- Keep dependencies updated:
pip install --upgrade -r requirements.txt - Monitor for security advisories:
pip-auditor similar tools - Review changelogs before major updates
- Use non-sensitive test data in examples
- Never hardcode credentials in test files
- Use environment variables for sensitive configurations
There are currently no known security vulnerabilities in this project.
Security advisories will be published in the GitHub Security section once fixes are released.
None at this time.
Thank you for helping keep Sloth Python secure! 🔒