Thank you for helping keep putergenai and its users safe.
We actively provide security fixes for the versions below. Older versions should be upgraded.
| Version | Supported |
|---|---|
| 3.5.0 | ✅ |
| 3.0.0 | ❌ |
| 2.1.0 | ❌ |
| 2.x | ❌ |
| 0.1.x | ❌ |
Note: Previously listed
1.5referred to0.1.5. This has been corrected.
If you believe you’ve found a security issue, please email:
- contact@fnbubbles420.org (preferred)
- Alternatively, open a GitHub private security advisory on the repository.
Please include:
- Affected version(s) and environment
- Reproduction steps or proof-of-concept
- Impact assessment (e.g., data exposure, RCE, DoS)
- Any suggested fixes or workarounds
We aim to acknowledge reports within 72 hours and provide a status update within 7 days.
- We follow coordinated disclosure.
- We’ll work with you to validate and fix the issue.
- We prefer a 14–30 day embargo window before public disclosure, depending on severity and patch complexity.
- We will credit reporters who request attribution (unless you prefer to remain anonymous).
putergenai depends on third-party libraries. We:
- Pin or minimum-pin versions to receive upstream security patches.
- Monitor advisories (PyPI, GitHub Advisories, NVD).
- Issue prompt releases when upstream vulnerabilities affect our package.
If a vulnerability affects a dependency only, please still report it—links to upstream issues are helpful.
- Critical fixes will be backported to the supported 0.1.x line when feasible.
- Release notes will highlight security-impacting changes.
If you need signed artifacts, contact us. We can provide signed wheels/SDists on request while we finalize our signing process.
Thank you for helping us protect the community.