Skip to content

Security: tkoyama010/pyvista-wasm

SECURITY.md

Security Policy

SPEC 8 — Securing the Release Process zizmor

Supported Versions

Version Supported
latest

SPEC 8 — Securing the Release Process

This project follows SPEC 8 for securing the release process:

  • Trusted Publishing: Releases are published to PyPI using OpenID Connect (OIDC) trusted publishing, eliminating the need for long-lived API tokens
  • Build Provenance Attestations: All PyPI releases include cryptographically signed build provenance attestations generated using Sigstore
  • Pinned Actions: All GitHub Actions are pinned to specific commit SHAs to prevent supply chain attacks
  • Secure Build Environment: Builds run in ephemeral GitHub Actions runners with minimal permissions

You can verify the attestations for any release by downloading the artifacts from PyPI and using the PyPI attestation verification tools.

Reporting a Vulnerability

If you discover a security vulnerability in pyvista-wasm, please report it responsibly.

Please do not report security vulnerabilities through public GitHub issues.

Instead, please report them via GitHub's private vulnerability reporting.

Include as much of the following information as possible:

  • Type of issue (e.g., code injection, cross-site scripting, etc.)
  • Full paths of source file(s) related to the issue
  • Steps to reproduce the issue
  • Proof-of-concept or exploit code (if possible)
  • Impact of the issue

We will acknowledge receipt of your report and work with you to understand and address the issue.

There aren’t any published security advisories