| Version | Supported |
|---|---|
| 2.x | ✅ |
| 1.x | ❌ |
If you discover a security issue in this project (e.g., in the Docker image, CI workflow, or dependency chain), please report it responsibly:
- Do not open a public issue.
- Use GitHub's private vulnerability reporting to submit your report.
- You will receive an acknowledgment within 72 hours and a resolution target of 30 days.
This is a LaTeX document template. It does not process untrusted input or run a network service. Security concerns are primarily related to:
- CI/CD workflow injection (e.g., unsafe context expression expansion in GitHub Actions)
- Supply-chain integrity of Docker base images and GitHub Actions (all pinned by digest/SHA)
- Pre-commit hook dependencies (pinned by version, updated via Dependabot)
- LaTeX shell-escape exploitation paths (shell-escape is disabled by default)
This project follows supply-chain security best practices:
- Docker base image pinned by
sha256digest - All GitHub Actions pinned to commit SHAs (not mutable tags)
- Pre-commit hooks pinned to specific versions
- Dependabot configured for automated dependency updates across Docker, GitHub Actions, and pre-commit ecosystems