The following versions of TorBoxSDK are currently supported with security updates:
| Target Framework | Supported |
|---|---|
| net10.0 | ✅ |
| net9.0 | ✅ |
| net8.0 | ✅ |
| net7.0 | ✅ |
| net6.0 | ✅ |
Please do NOT report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in TorBoxSDK, please report it responsibly by email at devrael1@protonmail.com.
GitHub's private security advisory reporting is not configured for this repository, so please do not use it for vulnerability reports.
When reporting, please include:
- A description of the vulnerability
- Steps to reproduce the issue
- The potential impact of the vulnerability
- Any suggested fixes, if applicable
You should receive an initial response within 72 hours acknowledging your report. We will work with you to understand the issue and coordinate a fix before any public disclosure.
When using TorBoxSDK, please follow these security practices:
- Never commit API keys or tokens to source control. Use environment variables or a secrets manager to store your TorBox API key.
- Never hardcode credentials in your application code, configuration files, or samples.
- Use
.gitignoreand tools likegit-secretsto prevent accidental commits of sensitive data. - Rotate your API key immediately if you suspect it has been exposed.
When a security vulnerability is reported, we will:
- Confirm the vulnerability and determine its impact.
- Develop and test a fix.
- Release a patched version.
- Publicly disclose the vulnerability after the fix is available.
We appreciate your help in keeping TorBoxSDK and its users safe.