| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in pg-safe-migrate, please report it responsibly.
- Do not open a public issue.
- Email security@pg-safe-migrate.com (replace with your actual email) with:
- A description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Any suggested fix (optional)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 5 business days
- Fix release: Within 30 days for critical issues
The following are in scope:
- SQL injection via migration file parsing
- Advisory lock bypass or escalation
- Checksum collision or tampering
- Credential exposure in logs or error messages
- Dependency vulnerabilities (critical/high severity)
- Issues in user-written migration SQL files
- PostgreSQL server vulnerabilities
- Social engineering attacks
We follow coordinated disclosure. We will:
- Confirm the vulnerability
- Develop and test a fix
- Release the fix with a security advisory
- Credit the reporter (unless they prefer anonymity)
When using pg-safe-migrate:
- Never commit
DATABASE_URLor credentials to version control - Use environment variables or secret managers for database URLs
- Run
pg-safe-migrate checkin CI to catch unsafe migrations before deploy - Enable
requireDown: truefor reversible deployment pipelines - Review all
-- pgsm:allowoverrides in code review - Use the minimum required database privileges for running migrations
- Regularly update pg-safe-migrate to receive the latest security patches