| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security seriously at ChronoServe. Please follow these steps to report security issues:
- DO NOT open public issues for security vulnerabilities
- Report issues - here
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Always use HTTPS in production
- Change all default credentials
- Use strong passwords
- Keep the secret key secure
- Run with minimal required privileges
- Store sensitive config values as environment variables:
CHRONOSERVE_SECRET_KEY=your-secure-key
CHRONOSERVE_ADMIN_PASSWORD=secure-admin-password- Use secure file permissions:
# Windows (PowerShell)
icacls .\config.yaml /inheritance:r /grant:r "SYSTEM:(R)" "ADMINISTRATORS:(F)"
# Linux
chmod 600 config.yaml
chown root:root config.yaml- JWT-based authentication
- Role-based access control
- Password security validation
- Rate limiting
- Secure default configurations
- Automated security checks