|
|
@@ -1,7 +1,7 @@
|
|
|
# Security Policy
|
|
|
|
|
|
> [!IMPORTANT]
|
|
|
-> **Bulk Reporting Policy:** If you need to submit multiple vulnerability reports in bulk, **you must contact us first** (support@quantumnous.com) to coordinate the submission process. Uncoordinated bulk submissions have caused significant disruption to our team, and we will take the following actions:
|
|
|
+> **Bulk Reporting Policy:** If you need to submit multiple vulnerability reports in bulk, **you must contact us first** ([support@quantumnous.com](mailto:support@quantumnous.com)) to coordinate the submission process. Uncoordinated bulk submissions have caused significant disruption to our team, and we will take the following actions:
|
|
|
>
|
|
|
> 1. **All uncoordinated bulk reports will be closed without review.**
|
|
|
> 2. **Repeated offenders may be blocked** from further submissions.
|
|
|
@@ -12,11 +12,13 @@
|
|
|
|
|
|
We provide security updates for the following versions:
|
|
|
|
|
|
+
|
|
|
| Version | Supported |
|
|
|
| ------- | ------------------ |
|
|
|
| Latest | :white_check_mark: |
|
|
|
| Older | :x: |
|
|
|
|
|
|
+
|
|
|
We strongly recommend that users always use the latest version for the best security and features.
|
|
|
|
|
|
## Reporting a Vulnerability
|
|
|
@@ -31,7 +33,7 @@ To report a security issue, please use the GitHub Security Advisories tab to "[O
|
|
|
|
|
|
Alternatively, you can report via email:
|
|
|
|
|
|
-- **Email:** support@quantumnous.com
|
|
|
+- **Email:** [support@quantumnous.com](mailto:support@quantumnous.com)
|
|
|
- **Subject:** `[SECURITY] Security Vulnerability Report`
|
|
|
|
|
|
### What to Include
|
|
|
@@ -91,4 +93,4 @@ For detailed configuration instructions, please refer to the project documentati
|
|
|
|
|
|
## Disclaimer
|
|
|
|
|
|
-This project is provided "as is" without any express or implied warranty. Users should assess the security risks of using this software in their environment.
|
|
|
+This project is provided "as is" without any express or implied warranty. Users should assess the security risks of using this software in their environment.
|