We actively support the following versions of Monstra with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of Monstra seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please send an email to the repository maintainer or create a private security advisory on GitHub.
Include the following information:
- Type of issue (e.g. memory leak, concurrency issue, etc.)
- Full paths of source file(s) related to the issue
- Step-by-step instructions to reproduce the issue
- Impact of the issue and potential exploitation
We will acknowledge receipt within 48 hours and provide a detailed response within 72 hours.
When using Monstra:
- Always use provided memory limits in
MemoryCache - Monitor cache statistics for unusual patterns
- Validate input data before task execution
- Use appropriate timeout values
- Implement proper error handling
- Follow documented concurrency limits
- Use provided synchronization mechanisms
- Automatic memory limit enforcement
- Thread-safe execution with proper synchronization
- Timeout protection for async operations
- Input validation for all cache operations