We actively support the latest version of ColorScripts-Enhanced.
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
If you discover a security vulnerability within ColorScripts-Enhanced, please send an email to the repository owner or open a private security advisory on GitHub.
- Type of issue (e.g., code injection, privilege escalation)
- Full paths of source file(s) related to the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution: Varies based on severity and complexity
We will acknowledge your email and work with you to understand and resolve the issue promptly.
- Keep Updated: Always use the latest version from the PowerShell Gallery
- Verify Sources: Only install from trusted sources (PowerShell Gallery)
- Review Code: This is open source - review the code before installation
- Sandboxing: Consider testing in isolated environments first
- Profile Security: Be cautious when adding to PowerShell profiles
- Script Execution: This module executes PowerShell scripts to display ANSI art
- Cache Storage: Cache files are stored in user's AppData directory
- File System Access: Module reads/writes to cache directory only
- No Network Access: Module does not make network requests
- No Sensitive Data: Module does not handle or store sensitive information
This security policy applies to:
- ColorScripts-Enhanced PowerShell module
- Associated scripts and tools in this repository
- Documentation and configuration files
Out of scope:
- Third-party dependencies (report to their respective maintainers)
- Issues in PowerShell itself
- Terminal emulator security
We appreciate responsible disclosure and will credit security researchers who report valid vulnerabilities (unless you prefer to remain anonymous).