| Version | Supported |
|---|---|
| 0.1.x | ✅ |
| 0.x (other) | ❌ |
If you discover a security vulnerability in wifimgr, please report it responsibly.
- Do NOT create a public GitHub issue for security vulnerabilities
- Email the maintainers directly at: security@cow.org
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment within 48 hours
- Status update within 7 days
- We aim to release fixes within 30 days for critical issues
- We follow coordinated disclosure practices
- We'll credit you in the security advisory (unless you prefer anonymity)
- Please allow us reasonable time to address the issue before public disclosure
- Store API tokens in
.env.wifimgrfile, not in config files - Never commit API tokens to version control
- Use environment variables for CI/CD pipelines
- Rotate tokens periodically
- Protect configuration files with appropriate file permissions
- Review site configurations before applying
- Use
--diffmode to preview changes - Keep backups of configurations
- Use HTTPS endpoints only (default)
- Validate SSL certificates
- Be cautious with proxy configurations
- Cache files may contain sensitive network information
- Located in
./cachedirectory by default - Protect with appropriate file system permissions
- Configuration backups may contain device settings
- Review backup retention policies
- Secure backup directories appropriately