We take security seriously and appreciate your effort to disclose vulnerabilities responsibly. This document outlines our security policy and guidelines for reporting security issues.
We ensure security updates and patches for the following versions of the project:
Version | Supported |
---|---|
1.x | ✅ Fully supported |
If you discover a security vulnerability in this project, please follow these steps:
-
Email Us
Send an email to[email protected]
with the subject "Security Issue: [Project Name]". Include the following details:- Description of the vulnerability.
- Steps to reproduce the issue (if applicable).
- Any supporting evidence, such as code snippets, screenshots, or logs.
-
Do Not Publicly Disclose
Please avoid publicly discussing or disclosing the issue until we have had a chance to investigate and address it. -
Acknowledgment
We will let you know your report within 72 hours and give you a timeline for the resolution.
The project relies on several dependencies for both the backend and frontend. We recommend monitoring these for potential vulnerabilities:
-
Django
- Risk: Ensure regular updates to mitigate vulnerabilities.
- Monitor: Django Security Releases.
-
Django REST Framework
- Risk: Potential exposure of sensitive data through APIs.
- Monitor: DRF Security Announcements.
-
django-cors-headers
- Risk: Misconfiguration may allow unauthorized access.
- Mitigation: Restrict allowed origins to trusted domains.
-
djangorestframework-simplejwt
- Risk: Token mismanagement may lead to unauthorized access.
- Mitigation: Set short expiration times and use HTTPS for secure transmission.
-
Poetry
- Risk: Outdated dependencies can lead to vulnerabilities.
- Mitigation: Regularly run
poetry update
.
-
Next.js
- Risk: XSS and SSRF vulnerabilities.
- Mitigation: Validate all inputs and sanitize outputs.
- Monitor: Next.js Security.
-
React
- Risk: Cross-Site Scripting (XSS).
- Mitigation: Use React's built-in XSS protection by avoiding
dangerouslySetInnerHTML
.
-
Tailwind CSS
- Risk: Misconfigured classes might expose sensitive content.
- Mitigation: Audit styles for accidental data exposure.
-
@nextui-org/react
- Risk: Library-specific vulnerabilities.
- Mitigation: Update regularly to the latest stable version.
-
framer-motion
- Risk: Limited security concerns, primarily animation errors.
- Mitigation: Test animations for performance and stability.
The project uses JWT Authentication with Google OAuth. Key considerations:
- JWT Risks:
- Token theft can lead to unauthorized access.
- Mitigation: Use short-lived tokens and refresh tokens securely.
- OAuth Risks:
- Misconfigured redirects may lead to phishing attacks.
- Mitigation: Validate redirect URIs and use HTTPS.
We recommend the following practices for secure deployment:
- Always use HTTPS to encrypt communications.
- Regularly update dependencies by monitoring them for vulnerabilities.
- Use environment variables for sensitive configuration values (e.g., secret keys).
- Enable CSRF protection for API endpoints where appropriate.
- Set up monitoring tools for security threats (e.g., Sentry, OWASP ZAP).
For any security concerns or questions, please email us at [email protected]
.
Thank you for helping us keep the project secure!