Security Policy¶
Supported Versions¶
| Version | Supported |
|---|---|
| 2026.x | |
| < 2026 |
Reporting a Vulnerability¶
We take security seriously. If you discover a security vulnerability in Lacuna, please report it responsibly.
How to Report¶
- Do not open a public GitHub issue for security vulnerabilities
- Use GitHub's private vulnerability reporting
- Include as much detail as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
What to Expect¶
- Acknowledgment: We aim to acknowledge receipt within 7 days
- Initial Assessment: Within 30 days, we will provide an initial assessment
- Resolution Timeline: We aim to resolve critical vulnerabilities within 90 days
- Disclosure: We will coordinate with you on public disclosure timing
Security Measures¶
This project implements the following security practices:
- Dependency Scanning: Dependabot monitors for vulnerable dependencies
- License Compliance: FOSSA scans for license policy violations
- Static Analysis: Bandit scans for common security issues in Python code
- Code Quality: Ruff, mypy, and other linters catch potential issues
Security Best Practices for Users¶
When deploying Lacuna:
- Keep dependencies up to date
- Use environment variables for sensitive configuration
- Run with least-privilege permissions
- Enable audit logging in production
- Review and customize policies for your environment