| Version | Supported |
|---|---|
| 1.x | Yes |
If you discover a security vulnerability in geohash-kit, please report it responsibly:
- Do not open a public GitHub issue.
- Email thecryptodonkey@proton.me with a description of the vulnerability, steps to reproduce, and any relevant proof-of-concept code.
- You will receive an acknowledgement within 48 hours.
- A fix will be developed privately and released as a patch version. You will be credited in the release notes unless you prefer otherwise.
geohash-kit is a pure computation library with zero runtime dependencies and no network or filesystem access. The primary attack surface is:
- Input validation bypass — malformed coordinates, geohash strings, or polygon data causing unexpected behaviour.
- Denial of service — crafted inputs that trigger excessive memory allocation or CPU usage (e.g. polygon coverage with extreme parameters).
- Prototype pollution — manipulated inputs that could pollute
Object.prototype(mitigated since v1.5.1).
- All public APIs validate inputs and throw
RangeErrororTypeErroron invalid parameters. - Ring expansion is capped at 10 rings to prevent runaway memory allocation.
polygonToGeohashesenforces amaxCellsbudget and throwsRangeErrorif the polygon cannot be covered within budget.- Base32 decoding uses a frozen lookup object to prevent prototype pollution.