There is no string exectution, buffer overflows (go is garbage collected) or the like. So most attack vectors should be closed. Additionally all dependancy are monitored and CodeQL is enabled to check for common errors on every push. In Case you find a vulnerability, then please contact me with the information below.
Only the newest version is relevant. There will be no support for older versions as of right now.
You can reach me anytime via: [email protected] I will try to come back to you as soon as I can.