We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in toon-rust, please report it responsibly.
Please do NOT open a public GitHub issue for security vulnerabilities.
Instead, please email the maintainer directly at: itsprabxxx@gmail.com
Include the following information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if you have one)
- You will receive an acknowledgment within 48 hours
- We will investigate and provide an initial assessment within 7 days
- We will keep you informed of our progress
- Once fixed, we will credit you in the security advisory (unless you prefer to remain anonymous)
- We will disclose the vulnerability after a fix is available
- We will coordinate with you on the disclosure timeline
- Security fixes will be released as patch versions when possible
When using toon-rust:
- Always validate input - Don't trust untrusted TOON data
- Use strict mode - Enable strict validation in
DecodeOptionswhen parsing untrusted input - Keep dependencies updated - Run
cargo updateregularly - Review changes - Review dependency updates for security implications
- Parsing untrusted input: Always use strict validation mode
- Memory limits: Very large inputs may cause memory issues
- DoS potential: Malformed input could cause excessive CPU usage
Thank you for helping keep toon-rust secure!