We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security seriously. If you discover a security vulnerability, please follow these steps:
Security vulnerabilities should be reported privately to allow us to address them before public disclosure.
- Email: security@datacorex.com (preferred)
- Private message: Contact the maintainers directly
Please include the following information in your report:
- Description: A clear description of the vulnerability
- Steps to reproduce: Detailed steps to reproduce the issue
- Impact: What an attacker could accomplish by exploiting this vulnerability
- Affected versions: Which versions of the software are affected
- Proof of concept: If possible, provide a minimal proof of concept
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Initial assessment: We will provide an initial assessment within 7 days
- Status updates: We will provide regular updates on our progress
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Keep software updated: Always use the latest version of DataCoreX
- Strong authentication: Use strong, unique passwords and enable 2FA when available
- Secure configuration: Follow the security configuration guidelines in the documentation
- Network security: Deploy behind a firewall and use HTTPS in production
- Monitor logs: Regularly review application and access logs
- Dependency management: Keep dependencies updated and scan for vulnerabilities
- Code review: All code changes require review before merging
- Static analysis: Use static code analysis tools to identify potential issues
- Input validation: Validate and sanitize all user inputs
- Authentication: Implement proper authentication and authorization
- Encryption: Use strong encryption for sensitive data at rest and in transit
- JWT tokens are stateless and cannot be revoked server-side
- Tokens have configurable expiration times
- Use strong secrets for JWT signing (minimum 256 bits)
- Default H2 console is enabled in development (disabled in production)
- Use strong database passwords in production
- Enable SSL for database connections in production
- API keys provide programmatic access and should be protected
- Rate limiting is recommended for production deployments
- Use HTTPS for all API communication in production
- File uploads are restricted by size and type
- Uploaded files are scanned and validated
- Consider additional antivirus scanning for production
The application implements the following security headers:
X-Content-Type-Options: nosniffX-Frame-Options: DENYX-XSS-Protection: 1; mode=blockStrict-Transport-Security(when HTTPS is enabled)Content-Security-Policy(configurable)
Cross-Origin Resource Sharing (CORS) is configured to:
- Allow requests from trusted origins only
- Restrict allowed HTTP methods
- Control allowed headers
- Prevent credential inclusion in cross-origin requests
- All user actions are logged with timestamps and user identification
- Failed authentication attempts are logged and monitored
- Administrative actions are tracked and auditable
- Passwords are hashed using BCrypt with appropriate salt rounds
- Sensitive data is not logged in plain text
- Personal data handling follows privacy best practices
We recommend the following security testing practices:
- Dependency scanning: Use tools like OWASP Dependency Check
- Static analysis: Use SonarQube or similar tools
- Dynamic testing: Perform penetration testing on production deployments
- Authentication testing: Test authentication and authorization mechanisms
- Input validation testing: Test all input validation and sanitization
In case of a security incident:
- Immediate response: Isolate affected systems
- Assessment: Determine the scope and impact
- Containment: Prevent further damage
- Recovery: Restore normal operations
- Post-incident: Document lessons learned and improve security
We regularly monitor and update third-party dependencies for security vulnerabilities:
- Backend: Spring Boot, Spring Security, and related libraries
- Frontend: React, Material-UI, and related packages
- Build tools: Maven and npm dependencies
We follow responsible disclosure practices:
- Security researchers are credited for their contributions (unless they prefer anonymity)
- We coordinate with researchers on disclosure timelines
- We provide security advisories for significant vulnerabilities
- We work with package managers and distributors to ensure updates reach users
For security-related inquiries:
- Security Team: security@datacorex.com
- General Contact: info@datacorex.com
- GitHub Security: Use GitHub's private vulnerability reporting feature
We thank the security research community for their contributions to making DataCoreX more secure.
Note: This security policy is subject to change. Please check this document regularly for updates.