| Version | Supported | Security Updates |
|---|---|---|
| 1.0.x | ✅ Yes | ✅ Yes |
| < 1.0 | ❌ No | ❌ No |
We take the security of the Email Domain Classifier seriously. If you discover a security vulnerability, please report it to us responsibly.
Preferred Method: Email our security team directly at security@montimage.com
Alternative Method: Create a private vulnerability report on GitHub
Please provide as much information as possible about the vulnerability:
- Vulnerability Type (e.g., buffer overflow, injection, cross-site scripting)
- Affected Versions of the software
- Detailed Description of the vulnerability
- Steps to Reproduce the issue
- Proof of Concept or exploit code (if available)
- Potential Impact of the vulnerability
- Suggested Mitigation (if you have a solution)
Subject: Security Vulnerability Report - [Brief Description]
Vulnerability Type: [Type of vulnerability]
Affected Versions: [List affected versions]
Severity: [Critical/High/Medium/Low]
Description:
[Detailed description of the vulnerability]
Steps to Reproduce:
1. [Step one]
2. [Step two]
3. [Step three]
Impact:
[Explanation of potential impact]
Suggested Fix:
[Your suggested fix, if any]
Additional Information:
[Any other relevant details]
- Initial Response: Within 48 hours of receiving your report
- Detailed Analysis: Within 7 business days
- Fix Release: As soon as practical, based on severity
- Public Disclosure: After fix is released, with appropriate credit
The Email Domain Classifier includes several security measures:
- Input Validation: CSV input is validated before processing
- Memory Management: Streaming processing prevents memory exhaustion
- Error Handling: Graceful handling of malformed input data
- No Network Access: Classifier operates entirely on local data
- No Arbitrary Code Execution: Safe text processing only
For users integrating the classifier:
- Input Validation: Validate email data before classification
- Access Control: Restrict access to classified output files
- Log Security: Protect classification logs containing sensitive data
- Regular Updates: Keep the package updated to the latest version
- Environment Isolation: Run in isolated environments when possible
- Vulnerability Assessment: Each report is evaluated for severity and impact
- Priority Classification: Critical > High > Medium > Low
- Fix Development: Patches are developed following secure coding practices
- Testing: Comprehensive testing including security regression tests
- Release: Security updates are released as soon as possible
- Disclosure: Public disclosure coordinated with reporters
- PyPI: Security updates published to Python Package Index
- GitHub Releases: Security releases tagged and documented
- Security Advisories: GitHub Security Advisories for disclosed vulnerabilities
We follow responsible disclosure practices:
- Private Coordination: Work with reporters privately during fix development
- Reasonable Timeline: Allow sufficient time for fix development and testing
- Credit Recognition: Acknowledge contributors who discover vulnerabilities
- Clear Communication: Provide clear information about fixes and mitigations
- Input Sanitization: Always validate and sanitize input data
- Error Handling: Implement proper error handling without information disclosure
- Dependency Management: Keep dependencies updated and vet them for security
- Code Review: Follow secure code review practices
- Testing: Include security tests in your test suite
- Least Privilege: Run with minimal necessary permissions
- Input Validation: Validate data before classification
- Secure Storage: Store classified output securely
- Access Control: Implement proper access controls for classified data
- Monitoring: Monitor for unusual activity in classification processes
- The classifier processes email content locally
- No data is transmitted to external services
- Output files contain classified email content
- Log files may contain sensitive information from input data
- Memory usage is controlled through streaming processing
- No network connections are made during classification
- File I/O is restricted to specified input/output directories
- CPU usage is proportional to input data size
- Limited external dependencies reduce attack surface
- Dependencies are regularly updated for security
- Each dependency is evaluated for security implications
- Automated scanning detects vulnerable dependencies
Our security team is responsible for:
- Vulnerability Assessment: Evaluating and triaging security reports
- Fix Development: Creating and testing security patches
- Coordination: Working with researchers and the community
- Documentation: Maintaining security documentation and advisories
- Compliance: Ensuring security best practices are followed
We thank all security researchers who help us keep the Email Domain Classifier secure. Your contributions are invaluable to maintaining the security and trustworthiness of our software.
Please report security vulnerabilities responsibly. Do not:
- Exploit vulnerabilities without permission
- Disclose vulnerabilities publicly before coordinated disclosure
- Use vulnerabilities to harm others or their systems
- Violate applicable laws during security research
By following responsible disclosure practices, you help us maintain security for all users.
For questions about this security policy or to report a security issue, contact us at security@montimage.com.