This project has not undergone a formal security audit. Use it with caution, especially on critical devices or environments where network exposure could have high impact.
Please report security issues privately via email:
Include as much detail as possible:
- Affected version and target hardware
- Steps to reproduce
- Logs and/or proof-of-concept
- Potential impact
We will acknowledge receipt and provide a timeline for investigation when possible.