We take the security of Laravel Deployment Scripts project seriously.
| Version | Supported |
|---|---|
| 1.0.x | β |
| < 1.0 | β |
If you discover a security vulnerability, please do not open a public issue.
- Send an email: ismail@usluer.net
- Provide details:
- Description of the vulnerability
- Affected version
- Steps to reproduce
- Potential impact
- Wait for response: We will respond within 48 hours
- Type of security vulnerability
- Affected file/code lines
- Steps to reproduce
- Potential impact assessment
- Suggested fix (if any)- β Delete after use
rm public/install.php
rm public/update.php-
β Check install.lock
- Script runs only once
- Don't manually delete the lock
-
β Add to .gitignore
public/*.php
public/install.lock- β Check file permissions
chmod 644 public/*.php-
β Use HTTPS
- Don't run over HTTP
- Use SSL certificate
-
β Be careful in production
- Enable maintenance mode
- Take backups
- Test in staging environment
# Protect sensitive information
APP_KEY=base64:...
DB_PASSWORD=...
# Debug off in production
APP_DEBUG=false
APP_ENV=productionβ οΈ Scripts run in public directory- β Always delete after use
- β Configure web server
# Block deployment scripts
location ~* \.(php)$ {
if ($request_filename ~* (install|update|clear-cache|refresh-cache)\.php$) {
return 403;
}
}# Block deployment scripts
<FilesMatch "(install|update|clear-cache|refresh-cache)\.php$">
Require all denied
</FilesMatch>- π§ Email: ismail@usluer.net
- π¬ Private disclosure: GitHub Security Advisory
Security researchers who responsibly disclosed vulnerabilities:
- (None yet - be the first!)
Security is our priority! Thanks for responsible disclosure.