The following versions of nlp2sql are currently being supported with security updates.
| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ❌ |
| < 0.1 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
- DO NOT open a public GitHub issue for security vulnerabilities
- Email the maintainers directly at [security contact email]
- Or use GitHub's private vulnerability reporting feature (Security tab > Report a vulnerability)
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days for critical issues
- Accepted: We will work on a fix and coordinate disclosure with you
- Declined: We will explain why the report does not qualify as a security vulnerability
Security issues relevant to this project include:
- SQL injection vulnerabilities in generated queries
- Credential exposure in logs or error messages
- Insecure handling of database connection strings
- Vulnerabilities in AI provider API key management
- Dependencies with known security issues
- Issues in third-party AI providers (OpenAI, Anthropic, Google)
- Vulnerabilities requiring physical access to the server
- Social engineering attacks
When using nlp2sql in production:
- Never commit
.envfiles - Use environment variables or secret management - Use read-only database credentials when possible
- Enable query validation to prevent dangerous SQL execution
- Review generated SQL before executing on sensitive data
- Keep dependencies updated - Run
uv syncregularly