You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For comprehensive examples and advanced patterns, see [`HOOKS.md`](./HOOKS.md).
221
222
223
+
## ❗ Error handling
224
+
225
+
Every public hook returns failures as `HookError` instances. Besides `message`, each error carries:
226
+
227
+
-`operation` – the hook action that failed (for example, `useSecureStorage.saveSecret`).
228
+
-`cause` – the original native error for additional diagnostics.
229
+
-`hint` – a short suggestion shown in the example app and useful for toast copy.
230
+
231
+
Biometric or device-credential prompts cancelled by the user now surface as a friendly message (`Authentication prompt canceled by the user.`) and *do not* poison hook state. Imperative calls still reject with the raw error so you can decide how to react.
We ship security fixes for the current v6 line and the latest v5 maintenance branch (≥ 5.6.0). Releases prior to 5.6.0 no longer receive patches—upgrade as soon as possible to stay protected.
12
+
13
+
## Reporting a Vulnerability
14
+
15
+
1.**Contact**: Email security reports to <mtw.andrade@gmail.com>.
16
+
2.**Disclosure Window**: We aim to acknowledge reports within 3 business days and provide a remediation plan within 10 business days.
17
+
3.**Coordinated Disclosure**: Please refrain from publicly disclosing the issue until a fix is available or 30 days have passed since acknowledgement.
18
+
19
+
## Patch Process
20
+
21
+
- Critical fixes ship in a point release for the supported branches (6.x and ≥ 5.6.0).
22
+
- Vulnerability advisories are published on the GitHub release page and npm once patches are available.
23
+
- We credit reporters who follow coordinated disclosure and wish to be acknowledged.
24
+
25
+
## Hardening Recommendations
26
+
27
+
- Stay on the latest minor release within your major version to receive defense-in-depth updates.
28
+
- Review the [Access control & metadata](README.md#-access-control--metadata) section for guidance on choosing the strongest policies.
29
+
- Test secure storage flows on physical hardware before shipping; emulators often omit secure elements.
30
+
31
+
Thank you for helping us keep `react-native-sensitive-info` secure.
0 commit comments