Please do not open public issues for security vulnerabilities.
If you discover a security vulnerability, please report it responsibly by emailing: [maintainer email or security contact]
Include:
- Description of the vulnerability
- Affected versions
- Steps to reproduce (if possible)
- Potential impact
- Suggested fix (if you have one)
We will:
- Acknowledge your report within 48 hours
- Investigate and validate the vulnerability
- Develop and test a fix
- Credit you in the security advisory (unless you prefer anonymity)
This security policy covers:
- Code vulnerabilities in this repository
- Dependency vulnerabilities we can control
- Contentful integration vulnerabilities
- Keep your
.env.localsecure—never commit it - Rotate Contentful API tokens regularly
- Use environment-specific tokens (never share prod tokens)
- Run
npm auditperiodically to check dependencies
- Never commit secrets (API keys, tokens, passwords)
- Use
.env.examplewith placeholder values - Follow the CMS boundary pattern (see
docs/cms-advanced.md) - Assume all environment variables are potentially public
- Review
.gitignorebefore committing
We use GitHub's Dependabot to scan for vulnerabilities in dependencies.
- Monitor Security Advisories
- Critical vulnerabilities trigger automatic security alerts
- We patch dependencies regularly
When we fix a security vulnerability:
- Day 1: Develop and test fix
- Day 2-3: Release patched version
- Day 3: Publish security advisory with credit
- Day 4: Announce in releases/changelog
Important: This is a public repository. Assume all code, commits, and issues are visible to the world.
- Do not commit secrets
- Do not include private information
- Do not assume anything is confidential
Thank you for helping keep this project secure.