Security
Reporting a vulnerability
Email security@namidb.com with details. Please do not open a
public GitHub issue for security reports.
What we ask for
- A clear description of the vulnerability.
- Steps to reproduce.
- Affected versions (engine, Python, server, Docker image).
- Suggested mitigation if you have one.
What we’ll do
- Acknowledge within 72 hours.
- Triage and confirm.
- Develop a fix on a private branch.
- Coordinate a release window with you.
- Publish a security advisory + patched releases.
- Credit you in the advisory (unless you’d rather stay anonymous).
Scope
In-scope:
- The NamiDB engine (all crates in
github.com/namidb/namidb) - The Python bindings
namidb-serverand its Docker image- The CLI
Out-of-scope (please report to the relevant vendor):
- Third-party dependencies (
tokio,object_store, etc.) — report upstream first; we’ll bump versions on disclosure. - NamiDB Cloud (
namidb.com) — covered under our Cloud bug bounty; contactsecurity@namidb.comfor scope.
Disclosure
NamiDB follows coordinated disclosure. We aim to ship a patched release before public disclosure, then publish a CVE + advisory once patched versions are available.
See also
- Full
SECURITY.mdin the engine repo: github.com/namidb/namidb/blob/main/SECURITY.md