We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
If you discover a security vulnerability, please do not open a public issue. Instead, please report it privately to:
Email: [email protected]
Please include the following information in your report:
- Type of vulnerability (e.g., XSS, SQL injection, authentication bypass)
- Full paths of source file(s) related to the vulnerability
- The location of the affected code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability, including how an attacker might exploit it
We will acknowledge receipt of your report within 48 hours and provide a more detailed response within 7 days indicating the next steps in handling your report.
- Report Received: We acknowledge receipt within 48 hours
- Investigation: We investigate and verify the vulnerability
- Fix Development: We develop a fix in a private branch
- Testing: We thoroughly test the fix
- Release: We release a security update
- Disclosure: We publicly disclose the vulnerability (after users have had time to update)
When using OCPI Python in production:
- Always use the latest stable version
- Keep your dependencies up to date
- Use HTTPS for all OCPI communications
- Implement proper authentication and authorization
- Validate and sanitize all inputs
- Use environment variables for sensitive configuration
- Regularly review and rotate API tokens and credentials
- Monitor your application logs for suspicious activity
- Authentication: Ensure proper token validation and authorization checks
- Data Validation: All OCPI data should be validated using Pydantic schemas
- Rate Limiting: Consider implementing rate limiting for production deployments
- Error Handling: Avoid exposing sensitive information in error messages
- Dependencies: Keep all dependencies up to date to avoid known vulnerabilities
Thank you for helping keep OCPI Python and its users safe!