Skip to content

Security: cdbk/cursor-defa

Security

SECURITY.md

Security Policy

Supported Versions

Version Supported
0.6.x
0.5.x

Reporting a Vulnerability

If you discover a security vulnerability within this project, please send an email to [email protected]. All security vulnerabilities will be promptly addressed.

What to include in your report

  • Description: A clear description of the vulnerability
  • Steps to reproduce: Detailed steps to reproduce the issue
  • Impact: Potential impact of the vulnerability
  • Suggested fix: If you have any suggestions for fixing the issue

Response timeline

  • Initial response: Within 48 hours
  • Status update: Within 1 week
  • Resolution: As soon as possible, typically within 30 days

Security Considerations

This project contains:

  • Cursor DEF-A development framework and guidelines
  • No sensitive data, API keys, or credentials
  • No executable code that could pose security risks
  • Configuration files for AI-assisted development

Safe for public use:

  • All rules are designed for public consumption
  • No proprietary or confidential information included
  • MIT License allows commercial use and modification

Best Practices

When using this project:

  1. Review rules before applying to your projects
  2. Test in development environment first
  3. Ensure compliance with your organization's security policies
  4. Keep your development environment secure

Contact

There aren’t any published security advisories