| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability within this package, please send an e-mail to Suliman Benhalim at [email protected]. All security vulnerabilities will be promptly addressed.
- Your report will be acknowledged within 48 hours.
- We will confirm the vulnerability and determine its impact.
- We will release a patch as soon as possible, depending on complexity.
Please do not report security vulnerabilities through public GitHub issues.
When using this package:
- Always keep your API token secure and never expose it in client-side code.
- Use environment variables for storing sensitive configuration.
- Implement proper access controls for SMS sending functionality.
- Log SMS sending activity for audit purposes.
- Consider rate limiting SMS sending operations to prevent abuse.
This package interacts with iSend SMS API. Please be aware that:
- Data sent via the API (phone numbers, message content) will pass through iSend's servers.
- iSend has its own privacy policy and security measures.
- You are responsible for ensuring your usage of the API complies with relevant data protection regulations.
Thank you for helping keep this package secure!