We release patches to fix security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
Version | Supported |
---|---|
1.x.x | ✅ |
< 1.0 | ❌ |
We take the security of our software seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
- Email: [email protected]
- Subject: [SECURITY] Apex Language Support - [Brief Description]
You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
- Type of issue (buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the vulnerability
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
This information will help us triage your report more quickly.
We prefer all communications to be in English.
When we receive a security bug report, we will assign it to a primary handler. This person will coordinate the fix and release process, involving the following steps:
- Confirm the problem and determine the affected versions.
- Audit code to find any similar problems.
- Prepare fixes for all supported versions. These fixes will be released as new versions.
- Never commit secrets or sensitive data to the repository
- Use environment variables for configuration
- Validate all inputs before processing
- Follow secure coding practices and use linting tools
- Review dependencies regularly for security updates
- Keep your dependencies updated to the latest secure versions
- Use the latest stable release of our software
- Report security issues through the proper channels
- Follow security best practices in your development environment
This repository includes several security features:
- Secret Scanning: Automatically detects secrets in code
- Dependency Scanning: Monitors for vulnerable dependencies
- Code Scanning: Static analysis for security issues
- Branch Protection: Prevents unauthorized changes to main branches
- Required Reviews: Ensures code changes are reviewed before merging
Security updates will be released as patch versions (e.g., 1.0.1, 1.0.2) and will be clearly marked in the release notes. Critical security fixes may be released as hotfixes outside the normal release schedule.
We would like to thank all security researchers and contributors who help us maintain the security of our software by responsibly reporting vulnerabilities.