We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please email security concerns to: security@thetempleoftwo.com
Please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if known)
- Acknowledgment: You should receive a response within 48 hours.
- Investigation: We will investigate and determine severity.
- Resolution: We will release a security patch and credit you in release notes (unless you prefer anonymity).
When using HTCA:
- Never commit API keys to version control
- Use environment variables for API keys
- Rotate keys regularly (at least quarterly)
- HTCA validation scripts send prompts to AI providers
- Review each provider's data retention policies:
- Avoid sending sensitive/proprietary data in validation experiments
- Keep dependencies updated:
pip install --upgrade -r requirements.txt - Review
requirements.txtfor security advisories
We appreciate security researchers. If you discover a vulnerability:
- Give us reasonable time to fix before public disclosure
- We will work with you on a coordinated disclosure timeline
- We will credit you publicly once the fix is released
Thank you for helping keep HTCA secure!