We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by email to:
Please include the following information:
- Type of vulnerability
- Full paths of source file(s) related to the manifestation of the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- We will acknowledge receipt of your vulnerability report within 48 hours
- We will send you a more detailed response within 5 business days indicating the next steps
- We will keep you informed about the progress towards a fix and announcement
- We may ask for additional information or guidance
CRITICAL: Never use default or placeholder secrets in production:
SESSION_SECRETmust be cryptographically random (min 32 characters)- All
STRAPI_*secrets must be unique, random values - Database connection strings must use strong authentication
- API keys and tokens must be rotated regularly
- Use Kubernetes Secrets - Never hardcode sensitive values in Helm values
- Enable RBAC - Apply principle of least privilege
- Network Policies - Restrict pod-to-pod communication
- Security Contexts - Run containers as non-root with read-only filesystems
- Image Scanning - Scan container images for vulnerabilities before deployment
- Rate Limiting - Enabled on all API endpoints
- Input Validation - All request bodies validated with Zod schemas
- CORS - Properly configured allowed origins
- Helmet - Security headers enabled with strict CSP
- Session Security - HttpOnly, Secure, SameSite cookies
This repository uses automated security scanning:
- Dependabot - Automatic dependency vulnerability detection
- CodeQL - Static application security testing (SAST)
- SonarQube - Continuous code quality and security analysis
- Docker Image Scanning - Base image vulnerability detection
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find similar problems
- Prepare fixes for all supported versions
- Release new security patch versions as soon as possible
For security-related questions or concerns, contact:
Email: security@vollcomdigital.com
PGP Key: Available on request