| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability in Whenny, please report it responsibly:
- GitHub Issue - Open an issue with the
securitylabel at github.com/ZVN-DEV/whenny - Email - Contact the maintainers at 78920650+zvndev@users.noreply.github.com
- Description of the vulnerability
- Steps to reproduce
- Affected version(s)
- Any potential fix you've identified
This is a small, MIT-licensed utility library maintained by a small team. We'll do our best to:
- Acknowledge your report within 7 days
- Provide an initial assessment within 14 days
- Release a fix for confirmed vulnerabilities as soon as practical
We appreciate responsible disclosure and will credit reporters in the changelog (unless you prefer anonymity).
Whenny is a date formatting/parsing library. Its attack surface is limited, but we take seriously:
- Input validation issues (malformed date strings, natural language parsing)
- Path traversal in the CLI tool (
create-whenny) - Dependency supply chain concerns (core has zero production dependencies by design)