WP Pinch handles sensitive data including API tokens and webhook URLs. Security is a top priority — we take it more seriously than a lobster takes its territory — and we take all reports seriously.
| Version | Supported |
|---|---|
| 3.0.x | Yes |
| 2.x | Yes |
| 1.0.x | Yes |
| < 1.0 | No |
If you discover a security vulnerability in WP Pinch, please report it responsibly. Do not open a public GitHub issue for security vulnerabilities.
- Email: Send a detailed report to me@nickhamze.com
- GitHub: Use GitHub's private vulnerability reporting
- A description of the vulnerability and its potential impact
- Steps to reproduce the issue
- The version of WP Pinch affected
- Any relevant configuration details (WordPress version, PHP version, hosting environment)
- Proof-of-concept code, if available
- Your suggested fix, if you have one
- Acknowledgment: Within 48 hours of your report
- Status update: Within 7 days, including an initial assessment and expected timeline for a fix
- Resolution: We aim to release a patch as quickly as possible, depending on the complexity of the issue
We follow a coordinated disclosure process:
- The reporter submits the vulnerability privately.
- We acknowledge receipt and begin investigation.
- We develop and test a fix.
- We release the fix and publish a security advisory.
- The reporter is free to disclose the vulnerability publicly after the fix is released.
We will credit reporters in the security advisory and changelog unless they prefer to remain anonymous.
The following areas are of particular interest:
- Authentication and authorization bypasses
- Exposure of API tokens or webhook secrets
- Injection vulnerabilities (SQL, XSS, CSRF)
- Privilege escalation via WP-CLI commands or REST API endpoints
- Data leakage through audit logs or analytics
For security-related inquiries, contact me@nickhamze.com.