Please report security vulnerabilities via GitHub Security Advisories.
Note: This is an open-source project maintained by volunteers. Response times may vary.
- Automated dependency scanning (Dependabot)
- Weekly security audits via GitHub Actions
- npm audit & signature verification
This project uses a CI-driven publish model to improve package provenance and reduce release risk.
- Releases are published from GitHub Actions, not from local developer machines.
- npm packages are published with provenance attestations (
npm publish --provenance). - Release workflow uses least-privilege permissions and OIDC (
id-token: write) for attestations. - Release tags are verified against
package.jsonversion before publishing.
Before publishing, verify these security controls:
NPM_TOKENexists as a repository secret and npm account has 2FA enabled.- Publish is executed via GitHub Actions workflows (never local
npm publish). - Provenance is present on npm after publish.
- If any anomaly appears, revoke npm tokens and rotate credentials immediately.
For the operational release process (stable/latest vs pre-release/next), see CONTRIBUTING.md.