| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
Please DO NOT report security vulnerabilities publicly.
Instead, please email security@localzet.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 24 hours and provide an initial response within 48 hours.
- Always keep dependencies up to date
- Use HTTPS in production
- Set
debug = falsein production - Use parameterized queries for database operations
- Validate and sanitize all user input
- Use CSRF protection for state-changing operations
- Keep secret keys secure and never commit them to version control
- Use environment variables for sensitive configuration
- Regularly review and update security configurations
- Monitor logs for suspicious activity
- We will investigate and respond to all security reports
- We will notify affected users if a vulnerability is confirmed
- We will provide patches for supported versions
- We will credit security researchers who responsibly disclose vulnerabilities (with permission)
- PHP file execution (
support_php_files) should be disabled in production unless absolutely necessary - Static file serving should be properly configured to prevent directory traversal
- URI validation is performed, but additional validation may be needed for specific use cases
- Exception details should not be exposed in production (ensure
debug = false)