We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
Please DO NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
security@tamtom.dev or open a private security advisory at https://github.com/tamtom/play-console-cli/security/advisories/new
You should receive a response within 48 hours. If for some reason you do not, please follow up to ensure we received your original message.
Please include the following information:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Acknowledgment - We'll acknowledge receipt within 48 hours
- Investigation - We'll investigate and determine severity (1-7 days)
- Fix Development - We'll develop a fix (depends on severity)
- Testing - We'll test the fix thoroughly
- Release - We'll release a patch version
- Disclosure - We'll publish a security advisory on GitHub
When using gplay:
- Store service account keys securely (never commit to git)
- Use environment variables or secure secret management in CI/CD
- Limit service account permissions to minimum required
- Rotate service account keys regularly
- Use different service accounts for different environments
- Review audit logs periodically
- Commit service account JSON files to version control
- Share service account keys via chat/email
- Use production credentials in development
- Grant excessive permissions to service accounts
- Store credentials in plain text config files (store paths only)
- Credentials Storage: Service account file paths (not contents) are stored in config files
- Temporary Files: Access tokens are never written to disk, only held in memory
- Logs: Debug mode redacts sensitive information (tokens, keys)
- File Permissions: Config files are created with 0600 permissions (user read/write only)
We use:
- Dependabot for automated dependency updates
govulncheckfor Go vulnerability scanninggosecfor static security analysis
All dependencies are reviewed before merging.