We are committed to providing security updates for the latest stable version of zwanski.org. As a web application, we continuously deploy updates and ensure that the most recent version is always supported. Users are encouraged to keep their browsers and operating systems updated to benefit from the latest security patches.
| Version | Supported |
|---|---|
| Latest | ✅ |
| Older | ❌ |
We are committed to ensuring the security of zwanski.org. If you discover a security vulnerability, we encourage you to report it to us as quickly as possible. Your efforts are greatly appreciated, and we will work with you to address the issue promptly.
Please report vulnerabilities via email to:
When reporting, please include the following information:
- Description of the vulnerability: A clear and concise description of the vulnerability, including its potential impact.
- Steps to reproduce: Detailed steps on how to reproduce the vulnerability. This is crucial for us to understand and verify the issue.
- Scope: The specific URL(s) or feature(s) affected.
- Proof of Concept (PoC): If possible, provide a proof of concept (e.g., screenshots, video, or code snippets) that demonstrates the vulnerability.
- Your contact information (optional): If you wish to be credited for your discovery, please include your name or a handle.
What to expect after reporting:
Upon receiving your report, we will:
- Acknowledge Receipt: We will send an email acknowledging receipt of your vulnerability report within 24-48 hours.
- Investigation: Our security team will investigate the reported vulnerability. This may involve reproducing the issue and assessing its impact.
- Status Updates: We will provide regular updates on the status of our investigation and remediation efforts. The frequency of updates will depend on the severity and complexity of the vulnerability.
- Remediation: Once the vulnerability is confirmed, we will prioritize its fix and deploy a patch as soon as possible.
- Disclosure: We will coordinate with you on the public disclosure of the vulnerability, if applicable, ensuring that appropriate measures are in place before disclosure.
We do not authorize any actions that could cause harm to our systems or data, or to our users. This includes, but is not limited to, denial-of-service attacks, spamming, or any activity that violates applicable laws. Any activities conducted in violation of this policy will be considered unauthorized and may result in legal action.
Thank you for helping us keep zwanski.org secure!