fast-robots 0.1.3

A zero-copy robots.txt parser with SIMD-accelerated byte scanning.
Documentation
# Security Policy

## Supported Versions

Security fixes are provided for the latest published version of `fast-robots`.

Until the crate reaches `1.0`, compatibility may change between minor versions. Please test against the latest release before reporting an issue that may already be fixed.

## Reporting a Vulnerability

Please do not open a public issue for a suspected security vulnerability.

Report privately by contacting the maintainer through the repository owner account or the contact method listed on crates.io, if available. Include:

- affected version or commit
- a minimal reproducer
- expected behavior
- observed behavior
- impact assessment

You should receive an initial response within 7 days. If the report is accepted, a fix and advisory will be coordinated before public disclosure where practical.

## Security Scope

Issues generally considered security-sensitive include:

- panics or excessive resource usage triggered by untrusted `robots.txt` input
- incorrect allow/disallow decisions with clear crawler policy impact
- unsound Rust or memory safety issues
- CLI behavior that can overwrite, delete, or unexpectedly expose local data

Issues generally not considered vulnerabilities by themselves:

- a website using `robots.txt` as an authorization mechanism
- crawler-specific differences for extension directives such as `Crawl-delay`
- missing support for non-standard directives unless they affect RFC 9309 parsing

## Disclosure

Accepted vulnerabilities will be fixed in a patch release when possible. Public disclosure should include the affected versions, fixed versions, impact, and suggested mitigation.

## Build & Supply Chain Hardening

This project uses the following hardening techniques:

- **Trusted Publishing**: crates.io releases are published via GitHub Actions OIDC, eliminating the need for long-lived API tokens.
- **Pinned SHA**: all GitHub Actions dependencies reference specific commit SHAs rather than mutable version tags, mitigating supply chain attacks.