Security fixes are back-ported to the latest minor release of each supported major version. Older majors are best-effort.
| Version | Supported |
|---|---|
| 2.x | ✅ |
| 1.x | ✅ (patch releases for security only) |
| < 1.0 | ❌ |
Please do not open a public GitHub issue for security reports.
Instead, use GitHub's private vulnerability reporting to submit the details. This keeps the report confidential until a fix is ready.
If you can't use that channel, email sashiksu@gmail.com with:
- A description of the issue and its impact.
- Steps to reproduce, ideally with a minimal code sample.
- The version(s) of
postal-code-checkeraffected. - Any suggested mitigation or patch, if you have one.
- Acknowledgement within 72 hours.
- Triage + initial assessment within 7 days.
- Fix timeline communicated once the scope is understood. Critical issues are prioritized; non-critical fixes ship with the next regular release.
You'll be credited in the release notes unless you prefer to stay anonymous.
This package has zero runtime dependencies and performs local validation only — no network calls, no I/O, no user data leaves the machine. In practice this keeps the attack surface small: the two realistic concerns are ReDoS in the bundled regex patterns and integrity of the upstream data source.
- Regex patterns are sourced from Google's
libaddressinputand anchored at both ends by the sync pipeline. If you identify a pattern with super-linear runtime on crafted input, report it here. - The package does not execute fetched data at install or runtime; there is no
postinstallscript.
Issues in upstream libaddressinput should be reported to Google directly.