Source License is currently in Alpha status. We provide security updates for the following versions:
| Version | Supported |
|---|---|
| Latest Alpha | β Yes |
| Previous Alpha Builds | β No |
Note: As we're in alpha, we recommend always using the latest version from the main branch.
We take security seriously. If you discover a security vulnerability in Source License, please report it responsibly.
For sensitive security issues, please use GitHub's private vulnerability reporting:
- Go to the Security tab of our repository
- Click "Report a vulnerability"
- Fill out the vulnerability details
- Submit your report
This method ensures that sensitive security information is kept private until a fix can be developed and deployed.
For less sensitive security issues that don't pose immediate risk if disclosed publicly, you can:
- Use our Security Vulnerability Issue Template
- Create a public issue with the
securitylabel
If you prefer not to use GitHub's reporting system:
- Email: Create a private issue first, and we can coordinate alternative communication if needed
- Subject Line: Use
[SECURITY] Source License Vulnerability Report
- Acknowledgment: We aim to acknowledge receipt of vulnerability reports within 24 hours
- Initial Assessment: We will provide an initial assessment within 72 hours
- Status Updates: Regular updates will be provided as we work on the issue
- Verification: We will reproduce and verify the reported vulnerability
- Impact Assessment: Determine the scope and severity of the security issue
- Fix Development: Develop and test a security patch
- Security Advisory: Prepare security advisory if needed
- Critical Vulnerabilities: Patches within 7 days
- High Severity: Patches within 14 days
- Medium Severity: Patches within 30 days
- Low Severity: Included in next regular release
We appreciate security researchers who help improve Source License's security:
We maintain a security researchers hall of fame for those who responsibly disclose vulnerabilities:
- Your name will be added to our security credits (with your permission)
- Recognition in release notes for security fixes
- Public acknowledgment in our documentation
β We encourage:
- Responsible disclosure of security vulnerabilities
- Providing detailed information to help us reproduce issues
- Allowing reasonable time for fixes before public disclosure
- Testing against the latest alpha version
β Please avoid:
- Accessing or modifying data that doesn't belong to you
- Disrupting our services or other users
- Social engineering attacks against our team or users
- Physical attacks against our infrastructure
- Always use HTTPS in production (
FORCE_SSL=true) - Strong passwords for admin accounts and database access
- Regular updates to the latest version
- Firewall configuration to restrict database access
- Environment variables for sensitive configuration
- Regular backups with encryption at rest
- Use dedicated database users with minimal required permissions
- Enable database connection encryption (SSL/TLS)
- Regularly update database software
- Monitor database access logs
- Use strong, unique passwords for database accounts
- Rotate JWT secrets regularly in production
- Rate limiting on API endpoints
- API key management for integrations
- CORS configuration for web applications
- Input validation on all API endpoints
- Protect license generation endpoints with proper authentication
- Monitor license validation attempts for abuse
- Implement rate limiting on license operations
- Secure storage of license keys and customer data
- Regular auditing of license operations
- JWT-based authentication for API access
- Session management with configurable timeouts
- Role-based access control for admin functions
- Secure password hashing using industry standards
- Multi-factor authentication support (planned)
- SQL injection prevention using prepared statements (Sequel ORM)
- Cross-Site Scripting (XSS) protection in templates
- Cross-Site Request Forgery (CSRF) protection
- Secure headers configuration
- Input validation and sanitization
- Security middleware for common protections
- Rate limiting to prevent abuse
- Audit logging for security-relevant operations
- Secure configuration defaults
- Environment-based configuration to protect secrets
- PCI DSS compliance through payment processor integration
- No card data storage (tokens only)
- Webhook signature verification
- Secure API communication with payment gateways
- Source License is currently in Alpha status
- Not recommended for production use with sensitive data
- Security features are still being developed and tested
- Breaking changes may occur including security-related changes
- Multi-factor authentication is planned but not yet implemented
- Advanced audit logging is under development
- Some security hardening features are still in progress
- Comprehensive security testing is ongoing
- Change all default passwords and secrets
- Configure HTTPS with valid SSL certificates
- Set up proper firewall rules
- Configure secure database connections
- Review and update environment variables
- Test backup and recovery procedures
- Apply security updates promptly
- Monitor security logs and audit trails
- Review user access and permissions
- Update SSL certificates before expiration
- Rotate API keys and secrets regularly
- Perform security assessments
- Have a security incident response plan
- Know how to quickly disable compromised accounts
- Maintain emergency contact information
- Document security incident procedures
- Test incident response procedures regularly
- Primary: Use GitHub's private vulnerability reporting
- Alternative: Create a private GitHub issue for coordination
- Response Time: 24 hours for acknowledgment, 72 hours for initial assessment
This security policy may be updated as Source License evolves. Key changes will be announced in:
- Release notes for version updates
- Security advisories when relevant
- Project announcements for major policy changes
Last Updated: July 2025 Policy Version: 1.0 (Alpha)
Thank you for helping keep Source License secure! π
Your responsible disclosure helps protect all users of our software licensing platform.