scankit 0.2.2

Walk + watch + filter directory trees. The shared scanner Tauri / Iced / native desktop apps reach for when they need to enumerate user files.
Documentation
# Security policy

## Reporting a vulnerability

scankit walks user-controlled directory trees and emits filesystem
events. If you find a security issue — memory safety, path-traversal
via crafted symlinks, denial-of-service via maliciously deep / wide
trees, race conditions in the watch loop — please report it privately
first.

**Email:** open a GitHub Security Advisory at
<https://github.com/seryai/scankit/security/advisories/new>.

We aim to acknowledge reports within **72 hours** and ship a fix or
mitigation within **14 days** for confirmed issues. Reports that meet
the responsible-disclosure criteria below are eligible for credit in
the release notes (and if the project ever has the budget, a bounty).

## Scope

- scankit's own code (this repository).
- Tagged releases on crates.io.

Out of scope:

- Vulnerabilities in upstream crates (`walkdir`, `notify`, `globset`,
  etc.) — please report those upstream. We will bump our pinned
  versions promptly when upstream fixes ship.
- Issues that require physical access to the user's machine or
  compromised credentials.

## Responsible-disclosure criteria

- Don't exploit a vulnerability beyond the minimum needed to confirm
  it.
- Don't access, modify, or exfiltrate data that doesn't belong to you.
- Give us reasonable time to ship a fix before public disclosure
  (90 days is the standard window).

## Supported versions

Only the latest published version of scankit on crates.io receives
security fixes. Once we hit 1.0, we'll commit to supporting the
current minor + the previous one.