tabkit 0.4.3

Tabular files → schema + sample rows. The shared spreadsheet reader Tauri / Iced / native desktop apps reach for when they need to introspect XLSX / CSV / TSV without inventing the same calamine-plus-type-inference glue twice.
Documentation
# Security policy

## Reporting a vulnerability

tabkit parses user-controlled tabular files (XLSX, XLS, CSV, TSV)
and infers schema. If you find a security issue — memory safety,
denial-of-service via maliciously crafted spreadsheets (zip-bombs,
adversarial cell formulas, billion-laughs equivalents), or
type-inference confusion that crosses trust boundaries — please
report it privately first.

**Email:** open a GitHub Security Advisory at
<https://github.com/seryai/tabkit/security/advisories/new>.

We aim to acknowledge reports within **72 hours** and ship a fix or
mitigation within **14 days** for confirmed issues. Reports that meet
the responsible-disclosure criteria below are eligible for credit in
the release notes (and if the project ever has the budget, a bounty).

## Scope

- tabkit's own code (this repository).
- Tagged releases on crates.io.

Out of scope:

- Vulnerabilities in upstream crates (`calamine`, `csv`, etc.) —
  please report those upstream. We will bump our pinned versions
  promptly when upstream fixes ship.
- Issues that require physical access to the user's machine or
  compromised credentials.

## Responsible-disclosure criteria

- Don't exploit a vulnerability beyond the minimum needed to confirm
  it.
- Don't access, modify, or exfiltrate data that doesn't belong to you.
- Give us reasonable time to ship a fix before public disclosure
  (90 days is the standard window).

## Supported versions

Only the latest published version of tabkit on crates.io receives
security fixes. Once we hit 1.0, we'll commit to supporting the
current minor + the previous one.