We actively support security updates for the latest major release.
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0.0 | ❌ |
If you discover a security vulnerability in this extension (for example, credential storage issues, SQL injection risks, or data leakage), please report it via GitHub issues and clearly mark it as a security report.
- Description of the vulnerability.
- Steps to reproduce the issue.
- Any relevant code snippets or screenshots (sanitize credentials before sending).
As a database tool, security is paramount. Here is how this extension handles sensitive data:
- Credential Storage: We utilize the VS Code Secret Storage API to persist connection strings and passwords. We do not store credentials in plain text in
settings.jsonor workspace state. - Telemetry (Opt-Out / Configurable): Telemetry is privacy-first and anonymized. It never sends SQL text, schema names, hostnames, database names, usernames, credentials, or object names.
- Telemetry Controls: Telemetry honors both extension settings and VS Code global telemetry (
vscode.env.isTelemetryEnabled) as a hard gate. You can disable telemetry entirely withpostgresExplorer.telemetry.mode = off. - Data Transmission: This extension operates locally for database traffic. Telemetry events are only sent when enabled and configured (for example with a PostHog API key), and include only anonymous usage/performance buckets.