If you discover a security vulnerability in OpenEstimate, please report it responsibly.
DO NOT open a public GitHub issue for security vulnerabilities.
-
GitHub Security Advisories (preferred): Go to Security Advisories and create a new advisory.
-
Email: security@openestimate.io
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
| Action | Timeframe |
|---|---|
| Acknowledgment | 48 hours |
| Initial assessment | 5 business days |
| Fix development | 14 business days (critical: 72 hours) |
| Public disclosure | After fix is released |
| Version | Supported |
|---|---|
| 0.1.x | Yes |
If you deploy OpenEstimate on your own infrastructure:
- Change
JWT_SECRETfrom the default value - Use HTTPS (TLS) in production — never expose HTTP publicly
- Set
APP_ENV=productionto disable debug endpoints (/api/docs,/api/redoc) - Use PostgreSQL with a strong password (not SQLite) for production
- Restrict
ALLOWED_ORIGINSto your actual domain - Keep Docker images updated (
docker compose pull) - Back up your database regularly
- Review
.envfile permissions — should be readable only by the app user - If using AI features, protect your API keys (OpenAI/Anthropic) — never commit them
- JWT authentication with configurable expiration
- Password hashing with bcrypt
- CORS middleware with configurable origins
- SQL injection prevention via SQLAlchemy ORM
- Input validation via Pydantic v2
- Rate limiting (configurable)
- Role-based access control (RBAC)