Please do not report security vulnerabilities through public GitHub issues, pull requests, discussions, or social media.
Email security reports to:
Include as much detail as you can safely share:
- The affected WeaveFFI version, crate, generated target, or CLI command.
- A minimal reproducer or proof of concept.
- The expected impact, such as code execution, memory unsafety, data exposure, denial of service, or generated-code vulnerability.
- Any known mitigations or workarounds.
We will acknowledge receipt within 7 days and will keep you updated while we investigate.
WeaveFFI is pre-1.0. Only the latest minor release receives security fixes. Older minor releases may receive fixes at maintainer discretion, but consumers should upgrade to the latest release before requesting backports.
| Version | Supported |
|---|---|
| Latest minor | Yes |
| Older minors | No |
We prefer coordinated disclosure. If you report a vulnerability privately, we will work with you to confirm the issue, prepare a fix, publish patched crates and binaries, and credit you in the advisory unless you prefer to remain anonymous.
Please give us a reasonable opportunity to release a fix before publishing details publicly.
Our standard timeline is 90 days from acknowledgement to public disclosure. That timeline may be shortened for active exploitation or extended by mutual agreement when the fix requires ecosystem coordination.
Expected flow:
- Acknowledge the report within 7 days.
- Confirm impact and affected versions.
- Prepare and test a fix.
- Release patched versions and publish an advisory.
- Publicly disclose technical details after the advisory is available.
Security-sensitive areas include:
- The
weaveffi-abiruntime and generated C ABI ownership rules. - Generated bindings that manage pointers, callbacks, async contexts, or language-runtime handles.
- The parser, validator, and
weaveffi extractinput handling. - CLI behavior that reads project files, runs hooks, or writes generated output.
Bug reports outside this scope are still welcome through normal GitHub issues.