| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability in Xeepy, please report it responsibly:
- ❌ Open a public GitHub issue
- ❌ Disclose the vulnerability publicly before it's fixed
- ❌ Exploit the vulnerability
- ✅ Email security concerns privately
- ✅ Provide detailed reproduction steps
- ✅ Allow time for us to address the issue
Please report security vulnerabilities to the repository owner via:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix deployment: Depends on severity
Security issues we care about:
- Session/cookie theft vulnerabilities
- Code injection possibilities
- Credential exposure risks
- Privilege escalation
- Data leakage
- Rate limiting bypass (intentionally not prevented in tool code)
- X/Twitter Terms of Service violations (user responsibility)
- Social engineering attacks
# DON'T commit session files
# Add to .gitignore:
session.json
cookies.json
*.session
# DON'T share your session
# Sessions contain authentication tokens# DON'T hardcode API keys
# BAD:
ai = ContentGenerator(api_key="sk-abc123...")
# GOOD:
import os
ai = ContentGenerator(api_key=os.environ.get("OPENAI_API_KEY"))# Create .env file (never commit!)
OPENAI_API_KEY=sk-...
ANTHROPIC_API_KEY=sk-ant-...
# Add to .gitignore
.env
.env.local# Verify package integrity
pip install xeepy --require-hashes
# Or check package checksums
pip hash xeepyXeepy is for educational purposes only. Users must:
- Comply with X/Twitter Terms of Service
- Respect rate limits
- Not use for harassment or spam
- Not scrape private/protected content without permission
- Comply with applicable laws (GDPR, CCPA, etc.)
Thank you for helping keep Xeepy secure! 🛡️