| Version | Supported |
|---|---|
| 1.x.x | β |
| < 1.0 | β |
π¨ Please do NOT report security vulnerabilities through public GitHub issues.
- Email: Send details to [[email protected]]
- Include:
- Type of vulnerability
- Affected component (CLI, API, Web Dashboard, MCP)
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 5 business days
- Status Updates: Every 7 days until resolved
- Fix & Disclosure: Coordinated disclosure after patch is released
- We'll confirm receipt of your report
- We'll investigate and validate the issue
- We'll develop and test a fix
- We'll release a security patch
- We'll publicly disclose with credit to you (unless you prefer to remain anonymous)
- β
Keep
composter-cliupdated:npm update -g composter-cli - β Use strong passwords (min 12 characters)
- β
Never share your session token (
~/.config/composter/session.json) - β Review component code before using in production
- β Enable 2FA on your GitHub account
# Generate strong secrets
export BETTER_AUTH_SECRET=$(openssl rand -hex 32)
# Use secure database connections
DATABASE_URL="postgresql://user:password@localhost:5432/composter?sslmode=require"
# Enable HTTPS only
export NODE_ENV=production- β Never commit
.envfiles - β Never hardcode secrets in code
- β Use environment variables for all sensitive data
- β
Run
npm auditbefore submitting PRs - β Sanitize all user inputs
- β Follow OWASP guidelines
- Session Tokens: Stored locally with 30-day expiry
- Database Access: User-scoped queries prevent cross-user access
- CORS: Configured for trusted origins only
- Dependencies: Regular audits with
npm audit
We don't currently offer a bug bounty program, but we deeply appreciate security researchers and will provide:
- Public acknowledgment (with your permission)
- Priority support for future issues
- Contributor credit in releases
Thank you for keeping Composter secure! π