Regular security scans and updates are conducted to identify and patch vulnerabilities. Critical patches must be applied promptly.
In case of a security incident, a predefined response plan is followed. An incident response plan outlines procedures for handling security incidents. It includes roles and responsibilities of incident response team members. This includes notifying affected parties, containing the incident, and conducting a post-incident review.
Everyone are encouraged to report security incidents promptly. They know how to recognize and respond to potential threats.
How to report a vulnerability:
- You just need to go to our issues section and add an issue there.
- After adding an issue, we will take it seriously and try to fix it.
Just go through our profile, often you can expect to get an update on a reported vulnerability, what to expect if the vulnerability is accepted or declined and etc.
Critical security patches are promptly applied to applications, and network devices. A defined process ensures timely patching. Automated vulnerability scans are conducted regularly to identify security weaknesses. Vulnerability assessment tools check for outdated software, misconfigurations, and known vulnerabilities.
Versions | Supported |
---|---|
1.0.0 | ✅ |