Do not open a public issue for a suspected vulnerability.
Instead, report it through the private security channel your organization uses and include:
- Affected area and impact.
- Reproduction steps or proof of concept.
- Known mitigations or workarounds.
This repository is a base template. Projects created from it should replace this file with a real security contact and response process.