# Security Policy
## Reporting a Vulnerability
If you discover a security vulnerability in sharira, please report it
responsibly through **GitHub Security Advisories**:
1. Go to the [Security tab](../../security/advisories) of this repository.
2. Click **"Report a vulnerability"**.
3. Fill in the details and submit.
**Do not open a public issue for security vulnerabilities.**
## Response Timeline
| Acknowledgement | Within **48 hours** |
| Initial assessment | Within **5 business days** |
| Fix for critical severity | Within **14 days** |
| Fix for high severity | Within **30 days** |
| Fix for moderate/low severity | Next scheduled release |
## Scope
This policy covers the `sharira` crate and its published API. Vulnerabilities
in dependencies should be reported to the respective upstream projects (and
flagged here if they affect sharira users).
## Supported Versions
| 1.x | Yes |
| < 1.0 | No |
## Design Principles
- **Zero unsafe** — no `unsafe` blocks anywhere in the codebase
- **No unwrap/panic** — all error paths return `Result` or safe defaults
- **No I/O** — pure computation library, no network or filesystem access
- **Minimal dependencies** — hisab (math), serde, thiserror, tracing only
- **Supply chain** — `cargo audit` and `cargo deny` in CI on every push
## Disclosure
We follow coordinated disclosure. Once a fix is released, we will publish a
security advisory crediting the reporter (unless anonymity is requested).