| Version | Supported |
|---|---|
| latest | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in PyQualify, please report it responsibly:
- Open a GitHub Security Advisory (preferred)
- Or email the maintainers directly with a description of the issue
Please include:
- A description of the vulnerability and its potential impact
- Steps to reproduce the issue
- Any suggested fixes or mitigations
You can expect an acknowledgement within 48 hours and a resolution timeline within 7 days for critical issues.
- API keys — PyQualify stores your API key in
~/.pyqualify/config.tomlwith owner-only permissions (0600). Never commit this file. .env.example— The provided example file contains no real secrets. Copy it to.envand fill in your values;.envis listed in.gitignore.- Analysis targets — PyQualify makes HTTP requests to the URLs and APIs you provide. Only analyze targets you own or have explicit permission to test.
- HTML reports — Generated reports may contain excerpts of the analyzed content. Treat them as sensitive if the target is sensitive.