You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Only the latest stable release receives security patches.
6
+
7
+
## Reporting a Vulnerability
8
+
9
+
Please **do not** open a public GitHub issue for security vulnerabilities.
10
+
11
+
Use [GitHub's private vulnerability reporting](https://github.com/krose/entsoeapi/security/advisories/new) to report issues confidentially.
12
+
13
+
We aim to acknowledge reports within **7 days** and release a patch within **90 days**, depending on severity.
14
+
15
+
## Scope
16
+
17
+
In scope: - Leakage or improper handling of the `ENTSOE_PAT` API token - Unsafe processing of API responses (XML/JSON parsing) - Vulnerable transitive dependencies
18
+
19
+
Out of scope: - Vulnerabilities in the ENTSO-E API itself - Issues requiring a compromised R environment
Copy file name to clipboardExpand all lines: README.Rmd
-2Lines changed: 0 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -193,6 +193,4 @@ entsoeapi::gen_per_prod_type(
193
193
194
194
## Code of Conduct
195
195
196
-
## Code of Conduct
197
-
198
196
Please note that the entsoeapi project is released with a [Contributor Code of Conduct](https://krose.github.io/entsoeapi/CODE_OF_CONDUCT.html). By contributing to this project, you agree to abide by its terms.
0 commit comments