The following versions of sqlalchemy-cubrid are currently supported for security updates:
| Version | Status |
|---|---|
| 0.7.x | ✅ Supported |
| 0.5.x | ✅ Supported |
| 0.4.x | ✅ Supported |
| 0.3.x | ✅ Supported |
| < 0.3 | ❌ Not Supported |
Security patches will be applied to supported versions only. Users are strongly encouraged to upgrade to the latest version.
We take security vulnerabilities seriously. If you discover a security issue in sqlalchemy-cubrid, please report it responsibly by emailing:
Email: paikend@gmail.com
Do not open a public GitHub issue for security vulnerabilities. Responsible disclosure allows us to address the issue before public disclosure.
- 48 hours: Initial acknowledgment of your report
- 7 days: Security assessment and initial response with remediation plan
- Ongoing: Regular updates on progress until resolution
A security issue is any vulnerability that could:
- Allow unauthorized access to data
- Enable authentication bypass or privilege escalation
- Permit SQL injection or other code execution attacks
- Compromise confidentiality, integrity, or availability of the system
- Allow denial of service (DoS) attacks
- Expose sensitive information (credentials, tokens, private data)
- Bypass security controls or safety mechanisms
- Affect the security posture of applications using sqlalchemy-cubrid
Examples include:
- SQL injection vulnerabilities in query construction
- Authentication/authorization flaws
- Insecure credential handling
- Cryptographic weaknesses
- Session management issues
- Input validation bypass
Please provide the following information with your vulnerability report:
- Description: Clear explanation of the vulnerability and its impact
- Affected Versions: Which version(s) of sqlalchemy-cubrid are vulnerable
- Steps to Reproduce: Detailed instructions to reproduce the issue
- Proof of Concept: Code sample, script, or test case demonstrating the vulnerability
- Impact Assessment: Severity assessment (Critical, High, Medium, Low) and potential consequences
- Suggested Fix: If you have a proposed patch or remediation strategy (optional but helpful)
- Your Contact Information: Name, email, and PGP key (if applicable)
When using sqlalchemy-cubrid, follow these security best practices:
- Always use parameterized queries (the default in SQLAlchemy) to prevent SQL injection
- Keep sqlalchemy-cubrid and SQLAlchemy updated to the latest versions
- Use secure connection parameters when connecting to CUBRID databases
- Follow the principle of least privilege for database credentials
- Regularly audit and monitor database access logs
- Never hardcode credentials in your application code
- Use environment variables or secure credential management systems
Once a security vulnerability is fixed:
- A security patch will be released
- The vulnerability will be disclosed in release notes
- An advisory may be published on GitHub Security Advisories
- Credit will be given to the reporter (if requested)
We appreciate your responsible disclosure and help in keeping sqlalchemy-cubrid secure.