| Version | Supported |
|---|---|
| 1.1.x | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability, please follow these steps:
- DO NOT create a public GitHub issue
- Report privately via one of these methods:
- Create a Security Advisory on GitHub
- Email: Open an issue asking for security contact (we'll provide a secure channel)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We aim to acknowledge receipt within 48 hours and provide a detailed response within 5 business days.
- Authentication and authorization issues
- Data exposure or leakage
- Cross-site scripting (XSS)
- SQL injection vulnerabilities
- Remote code execution
- Privilege escalation
- Denial of service vulnerabilities
- Vulnerabilities in third-party services (Pocket API, OAuth providers)
- Issues that require physical access to a user's device
- Social engineering attacks
- Vulnerabilities in outdated versions (please update first)
We follow a coordinated disclosure timeline:
- Reporter submits vulnerability
- We acknowledge and investigate (48 hours)
- We develop and test a fix
- We release the fix
- We publicly disclose after 90 days or when fix is widely deployed
We appreciate security researchers who help keep Article Saver secure. With your permission, we'll acknowledge your contribution in our security advisories.
This project follows security best practices:
- ✅ No credentials in source code
- ✅ Environment variables for sensitive configuration
- ✅ Regular dependency updates via Dependabot
- ✅ Secure authentication with JWT tokens
- ✅ Input validation and sanitization
- ✅ SQL injection prevention via Prisma ORM
- ✅ XSS protection in React components
- ✅ HTTPS enforcement in production
All sensitive configuration is managed through environment variables. See .env.example files for templates.
When setting up OAuth providers:
- Client IDs can be public (less sensitive)
- Client Secrets must NEVER be committed
- Use environment variables for all secrets
- Restrict OAuth redirect URIs in provider settings
We use automated tools to keep dependencies secure:
- GitHub Dependabot for vulnerability alerts
- Regular manual security audits
- Automated testing for security regressions