We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| latest | ✅ |
| < 1.0 | ❌ |
We take the security of Radar seriously. If you discover a security vulnerability, please follow these steps:
Security vulnerabilities should not be disclosed publicly until a fix is available.
Send details to: security@wbfoss.org
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Your contact information
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 24-48 hours
- High: 7 days
- Medium: 14 days
- Low: 30 days
- We will acknowledge your report within 48 hours
- We will provide regular updates on our progress
- Once a fix is available, we will:
- Deploy the fix
- Publish a security advisory
- Credit you (if you wish) in the advisory
- No User Data Storage: We do not store user data beyond OAuth sessions
- No Database: All data is in Git, version-controlled and auditable
- Environment Variables: Secrets managed via environment variables (never committed)
- GitHub OAuth: Secure authentication via Auth.js (NextAuth)
- API Protection: All write operations require authentication
- CSRF Protection: Built into Auth.js
- Rate Limiting: Implemented at middleware level
- Zod Schemas: All inputs validated with strict schemas
- Allowlists: Tags and licenses validated against allowlists
- URL Validation: Repository and website URLs validated
- File Size Limits: Logo files limited to 200 KB
- Content Sanitization: All user content sanitized
- HTTPS Only: All traffic over HTTPS
- Security Headers:
X-Content-Type-Options: nosniffX-Frame-Options: DENYX-XSS-Protection: 1; mode=blockReferrer-Policy: strict-origin-when-cross-origin
- Webhook Verification: HMAC signature verification for GitHub webhooks
- Dependency Scanning: Automated via Dependabot
- Branch Protection: Main branch requires reviews and passing CI
- Signed Commits: Recommended (not required)
- DCO: Contributor agreement via sign-off
- Secrets Management: GitHub Secrets for sensitive data
- Security vulnerabilities in the application code
- Authentication/authorization bypasses
- XSS, CSRF, injection vulnerabilities
- Information disclosure
- Denial of service (if reproducible)
- Issues in dependencies (report to maintainers directly)
- Social engineering attacks
- Physical security
- Spam/abuse of submission form (report via normal channels)
- Issues requiring physical access to infrastructure
- Never commit secrets (API keys, tokens, passwords)
- Validate all inputs before processing
- Use parameterized queries (if adding database features)
- Avoid eval() and similar dangerous functions
- Keep dependencies updated
- No executable code in TOML files
- Validate URLs before adding
- Check file sizes for logos
- No external resources loaded at runtime
- Use .env.local for local secrets (never commit)
- Rotate tokens regularly
- Minimum permissions for GitHub tokens (public_repo only)
- Webhook secrets should be random, high-entropy strings
None currently. Check Security Advisories for updates.
Subscribe to security advisories:
- Watch this repository
- Enable notifications for security updates
- Follow @wbfoss for announcements
- Security Email: security@wbfoss.org
- General Contact: community@wbfoss.org
- GitHub: https://github.com/wbfoss/fossradar
We appreciate security researchers who responsibly disclose vulnerabilities. Contributors will be credited in:
- Security advisories
- CHANGELOG
- Hall of Fame (if desired)
Thank you for helping keep Radar secure!