If you discover a security vulnerability in any CUBRID Labs project, please do not open a public issue. Instead, follow one of these secure reporting methods:
Use the Private Vulnerability Reporting feature on each repository:
- Go to the repository's Security tab
- Click Report a vulnerability
- Fill out the form with details about the vulnerability
- Submit — this creates a private advisory visible only to maintainers
If you prefer email, contact the maintainers directly with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Check the individual repository's SECURITY.md file for specific contact information.
- Initial Report: Acknowledgment within 24–48 hours
- Assessment: Severity determination and impact analysis (1–7 days)
- Fix Development: Patch development and testing (depends on complexity)
- Coordinate Release: Public disclosure coordinated with fix release
- Public Disclosure: Security advisory published after patch is available
Security updates are provided for:
- Latest major version: All patch versions
- Previous major version: Critical fixes only
Check individual repository documentation for specific version support policies.
When using CUBRID Labs projects:
- Keep dependencies updated — Regularly update the driver/ORM to the latest version
- Use TLS for connections — Always encrypt database connections in production
- Validate input — Avoid SQL injection by using parameterized queries (not string interpolation)
- Restrict permissions — Use least-privilege database accounts
- Monitor logs — Track authentication failures and unusual queries
We appreciate responsible security disclosures and will credit researchers in security advisories (unless they prefer anonymity).
Questions about security? Post in GitHub Discussions or email the maintainers.