We actively support and provide security updates for the following versions:
| Version | Supported |
|---|---|
| latest | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
- Do NOT create a public GitHub issue for security vulnerabilities
- Email the security team directly at: [your-email@example.com]
- Include in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (optional)
- Acknowledgment: We will acknowledge your report within 48 hours
- Timeline: We aim to provide a more detailed response within 7 days
- Updates: We will keep you informed of our progress toward a fix
- Credit: We will acknowledge your contribution (if you wish)
This security policy applies to:
- The main repository code
- All official releases
- Documentation related to the project
- Social engineering attacks
- Physical security
- Denial of service attacks (unless they exploit a specific code vulnerability)
- Issues in third-party dependencies (report to the respective maintainers)
When using this template, please follow these security guidelines:
- Never commit
.env.localfiles or actual secrets to version control - Use
.env.examplefiles as templates (without real credentials) - Rotate API keys and secrets regularly
- Use different credentials for development and production
- Enable Row Level Security (RLS) policies for all tables
- Use the anon key for client-side operations
- Only use the service role key on the server side with proper access controls
- Never expose the service role key to client applications
- Keep dependencies up to date
- Review dependency changes before updating
- Use
yarn auditregularly to check for vulnerabilities
Security updates will be released as patch versions and announced in the release notes.