We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
The UCP Merchant Directory team takes security bugs seriously. We appreciate your efforts to responsibly disclose your findings.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by emailing:
If you prefer encrypted communication, you can use our PGP key (available upon request).
To help us better understand and resolve the issue, please include as much of the following information as possible:
- Type of issue (e.g., XSS, injection, authentication bypass, data exposure)
- Full paths of source file(s) related to the manifestation of the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Any special configuration required to reproduce the issue
After you submit a report, we will:
- Acknowledge receipt within 48 hours
- Provide an initial assessment within 5 business days
- Keep you informed about our progress
- Notify you when the issue is fixed
- Publicly credit you for the discovery (unless you prefer to remain anonymous)
- Initial Response: Within 48 hours
- Status Update: Within 5 business days
- Fix Timeline: Varies by severity
- Critical: 1-7 days
- High: 7-14 days
- Medium: 14-30 days
- Low: 30-90 days
- We will work with you to understand the scope and impact of the vulnerability
- We will keep you informed as we develop and test fixes
- We ask that you give us a reasonable amount of time to fix the issue before public disclosure
- We will credit you in our security advisories (unless you wish to remain anonymous)
When we receive a security bug report:
- We confirm the issue and determine affected versions
- We audit code to find similar problems
- We prepare fixes for all supported versions
- We release new versions as soon as possible
- We publish a security advisory
We support safe harbor for security researchers who:
- Make a good faith effort to avoid privacy violations, data destruction, and service disruption
- Only interact with accounts you own or with explicit permission of the account holder
- Do not exploit the vulnerability beyond what is necessary to confirm it exists
- Report the vulnerability promptly to security@awesomeucp.com
- Keep the vulnerability confidential until we have issued a fix
We will not pursue legal action against researchers who follow these guidelines.
When deploying the UCP Merchant Directory:
- Keep dependencies updated - Run
bun auditornpm auditregularly and update packages - Use HTTPS - Always serve the directory over HTTPS in production
- Validate merchant data - Review merchant submissions for malicious content
- Environment variables - Never commit sensitive credentials or API keys
- Monitor logs - Review application logs for suspicious activity
- Rate limiting - Consider implementing rate limiting for the API endpoints
- CORS configuration - Configure CORS appropriately for your deployment
The directory displays merchant-submitted data including:
- Store names and descriptions
- Logo URLs (external images)
- UCP profile data
- Website URLs
While we validate JSON structure and basic formatting:
- We sanitize and validate all displayed content
- External logo URLs are loaded through Next.js Image optimization
- All merchant URLs open in new tabs with proper security attributes
Recommendation: When reviewing merchant submissions:
- Verify merchant authenticity
- Check logo URLs are legitimate
- Validate UCP profile endpoints are live
- Review for potential phishing attempts
The directory provides public API endpoints for merchant discovery. While these are read-only:
- Consider implementing rate limiting in production
- Monitor for unusual access patterns
- Cache responses to prevent abuse
- Use CDN for DDoS protection
The directory uses Next.js static generation:
- All merchant data is embedded at build time
- No server-side database queries
- Reduced attack surface for injection vulnerabilities
- Updates require rebuild and redeployment
We regularly update dependencies to patch known vulnerabilities. You can check the current security status:
bun audit
# or
npm auditWhen deploying, consider implementing a strong Content Security Policy:
Content-Security-Policy: default-src 'self'; img-src 'self' https: data:; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline';
We would like to thank the following researchers for responsibly disclosing security issues:
- No reports yet
If you have questions about this security policy, please email security@awesomeucp.com.