Sure, here's the security policy content tailored for your IVF Treatment Success Prediction project:
Version | Supported |
---|---|
5.1.x | ✅ |
5.0.x | ❌ |
4.0.x | ✅ |
< 4.0 | ❌ |
If you discover a vulnerability in the IVF Treatment Success Prediction project, please report it to our security team using the following methods:
- Email: Send an email to [email protected] with details of the vulnerability.
- Issue Tracker: Open an issue in our GitHub repository with the label "security".
Please include the following information to help us understand and address the vulnerability efficiently:
- Detailed description of the vulnerability.
- Steps to reproduce the vulnerability.
- Potential impact of the vulnerability.
- Any suggestions for a fix or mitigation.
You can expect an acknowledgment of your report within 48 hours. We will work with you to understand the issue and will keep you updated throughout the process. Our goal is to provide a fix within two weeks, depending on the complexity of the vulnerability.
Once the vulnerability is reported, we will:
- Investigate and confirm the vulnerability.
- Provide regular updates on the status of the investigation and fix.
- Release a patch or update to address the vulnerability.
- Give credit to the reporter (if desired) in the release notes.
We appreciate your efforts to make our project more secure and thank you for your responsible disclosure.