We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.1.x | ✅ |
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
Please do not create a public GitHub issue for security vulnerabilities.
Send your findings to: [email protected]
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Your contact information
- Initial Response: Within 48 hours
- Assessment: Within 5 business days
- Fix Timeline: Depends on severity
- Critical: 7 days
- High: 14 days
- Medium: 30 days
- Low: Next release
- We confirm the vulnerability and scope
- We develop and test a fix
- We release the fix
- We publish a security advisory
- We credit you in the advisory (if desired)
When contributing code:
-
No Secrets in Code
- Never commit API keys, passwords, or tokens
- Use environment variables
- Review code before committing
-
Input Validation
- Validate all user inputs
- Sanitize data before processing
- Use parameterized queries
-
Authentication & Authorization
- Follow OAuth 2.0 / OIDC standards
- Implement proper session management
- Use JWT tokens securely
-
Dependencies
- Keep dependencies updated
- Review security advisories
- Use
npm auditregularly
-
Error Handling
- Don't expose sensitive information in errors
- Log security events
- Handle errors gracefully
-
HTTPS Only
- Enforce HTTPS in production
- Use valid SSL certificates
- Enable HSTS
-
Environment Variables
- Store secrets in secure vaults
- Rotate credentials regularly
- Limit access to production secrets
-
Database Security
- Use encrypted connections
- Implement row-level security
- Regular backups
- Restrict database access
-
Monitoring
- Log security events
- Monitor for suspicious activity
- Set up alerts
- Regular security audits
- Uses Keycloak for SSO
- JWT tokens with expiration
- Refresh token rotation
- Password complexity requirements
- Personal data encrypted at rest
- Secure transmission (TLS 1.3)
- GDPR compliance measures
- Data retention policies
- Rate limiting
- CORS configuration
- Input validation
- SQL injection prevention
- XSS protection
Before merging, ensure:
- No secrets in code
- Input validation implemented
- SQL injection prevented
- XSS vulnerabilities addressed
- Authentication/authorization checked
- Dependencies updated
- Security tests added
- Error messages don't leak info
We use the following tools:
- npm audit - Dependency vulnerability scanning
- SonarQube - Code quality and security
- OWASP ZAP - Security testing (planned)
- Dependabot - Automated dependency updates
Subscribe to security advisories:
- GitHub Security Advisories
- Project mailing list
- Release notes
For security concerns:
- Email: [email protected]
- PGP Key: [Link to PGP public key]
For general questions:
- GitHub Discussions: https://github.com/orangecarrental/discussions
- Email: [email protected]
Last Updated: 2025-11-21
🤖 Generated with Claude Code
Co-Authored-By: Claude [email protected]