Enterprise-ready guidance for reporting vulnerabilities, shipping patches, and operating VectoBeat securely.
| Channel | Examples | Support Status |
|---|---|---|
| main | Latest commit on main |
✅ Full support |
| Tagged Releases | vX.Y.Z semver tags announced in the README |
✅ Supported until superseded |
| Forks / Custom Builds | Self-maintained patches, private plugins |
Reproducible reports must target the latest commit on main or the most recent supported tag. Heavily modified forks may require you to maintain your own patch.
- Keep reports private. Do not open public issues or discussions for vulnerabilities.
- Contact the security desk:
- Email: timhauke@uplytech.de
- Discord: DM any maintainer in VectoBeat Support
- Provide actionable evidence:
- Affected version, deployment method, and configuration snippets.
- Step-by-step reproduction (slash commands, payloads, API calls).
- Impact assessment (token leak, playback disruption, privilege escalation, etc.).
- Logs or proof-of-concept scripts (sanitize secrets beforehand).
- Encrypt if needed. Request a secure upload location for large files or encrypted archives.
Response targets:
| Severity | Examples | Ack SLA | Fix / Advisory Target |
|---|---|---|---|
| Critical | Token leakage, RCE, auth bypass | < 24h | < 7 days |
| High | Privilege escalation, data exposure, playback outage across guilds | < 48h | < 14 days |
| Medium | Information disclosure without secrets, DoS requiring unusual configuration | < 72h | < 30 days |
| Low | Best-practice gaps, low-impact configuration bugs | < 5 business days | As scheduled |
- Capture the exact git commit SHA and bot build metadata.
- List guild count, shard count, and hosting environment (Docker, bare metal, Kubernetes).
- Share relevant `config.yml` excerpts and `.env` variables with secrets redacted.
- Include Lavalink node version, enabled plugins, and whether SSL is enforced.
- Attach sanitized Discord interaction IDs or trace IDs to correlate logs.
|
|
- Dependabot (`.github/dependabot.yml`) raises weekly PRs for pip, Docker, and GitHub Actions ecosystems.
- The `security` GitHub Actions workflow executes static analysis and dependency audits on every push.
- When adding new dependencies, run
pip install --upgrade -r requirements.txt, regenerate lock files if applicable, and capture the reasoning in your PR.
Thank you for partnering with us to keep the VectoBeat community safe.