We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
Please report (suspected) security vulnerabilities to emvakar@gmail.com. You will receive a response within 48 hours. If the issue is confirmed, we will release a patch as soon as possible depending on complexity but historically within a few days.
Please include the following information in your report:
- Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
This information will help us triage your report more quickly.
When using EKNetwork, please follow these security best practices:
-
Always use HTTPS for production API calls
-
Validate and sanitize all user inputs before sending requests
-
Store tokens securely using Keychain or secure storage mechanisms
-
Implement proper error handling to avoid exposing sensitive information
-
Keep dependencies updated to the latest secure versions
-
Use certificate pinning for critical API endpoints when appropriate
-
Implement rate limiting to prevent abuse
-
Log security events for monitoring and auditing
-
Never include secrets in URLs: Do not place authentication tokens, API keys, or other sensitive data in:
- Request paths (e.g.,
/api/users/{token}) - Query parameters (e.g.,
?api_key=secret) - Base URLs (e.g.,
https://api.example.com?key=secret)
Instead, use:
- HTTP headers (e.g.,
Authorization: Bearer <token>) - Request bodies for POST/PUT requests
- Secure token storage mechanisms
Note: EKNetwork logs paths and errors with
privacy: .privateto prevent sensitive data from appearing in logs, but you should still avoid placing secrets in URLs as they may be exposed in network traces, browser history, or server logs. - Request paths (e.g.,
When we receive a security bug report, we will assign it to a primary handler. This person will coordinate the fix and release process, involving the following steps:
- Confirm the problem and determine the affected versions
- Audit code to find any potential similar problems
- Prepare fixes for all releases still under maintenance
- Publish security advisories
We follow a coordinated disclosure process. We will notify you when we've received your report and keep you updated on our progress.
We appreciate responsible disclosure of security vulnerabilities. With your permission, we will acknowledge your contribution in our security advisories.