Skip to content

Security: skreds/LinkAce

Security

SECURITY.md

Security Policy

Supported Versions

There is no warranty for the program, to the extent permitted by applicable law. Except when otherwise stated in writing the copyright holders and/or other parties provide the program "as is" without warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the quality and performance of the program is with you. Should the program prove defective, you assume the cost of all necessary servicing, repair or correction.

In no event unless required by applicable law or agreed to in writing will any copyright holder, or any other party who modifies and/or conveys the program as permitted above, be liable to you for damages, including any general, special, incidental or consequential damages arising out of the use or inability to use the program (including but not limited to loss of data or data being rendered inaccurate or losses sustained by you or third parties or a failure of the program to operate with any other programs), even if such holder or other party has been advised of the possibility of such damages.

Version Supported
0.x
1.x

Support for PHP versions

The PHP version supported by LinkAce is the oldest version of PHP that is still officially supported in terms of security fixes. You can check the currently supported versions on php.net.

Reporting a Vulnerability

All dependencies are updated regularly, security fixes for those dependencies are released as fast as possible.

If you discover a security vulnerability, please contact me directly via contact [at] linkace [dot] org. Those vulnerabilities are addressed as fast as possible.

Bug Bounties

The LinkAce project offers bug bounties for finding critical security vulnerabilities. Bounties are paid from the funds available in the Open Collective account. Please notice that the actual paid amounts are subject to negotiation and depend on the severity of the vulnerability.

There aren’t any published security advisories