Skip to content

Security: LerianStudio/reporter

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.

How to Report

You can report security vulnerabilities through:

  1. GitHub Security Advisory (Preferred)

    • Go to the Security tab of this repository
    • Click "Report a vulnerability"
    • This allows private discussion until a fix is ready
  2. Email

Please do NOT disclose the vulnerability publicly until we have addressed it.

Response Timeline

Action Timeframe
Acknowledgment Within 24 hours
Initial assessment Within 72 hours
Status update Within 7 days
Resolution target Within 90 days (severity dependent)

Disclosure Process

  1. Initial Contact: You submit vulnerability via GitHub Advisory or email
  2. Acknowledgment: We confirm receipt within 24 hours
  3. Verification: Our security team verifies the vulnerability
  4. Assessment: We determine severity and potential impact
  5. Resolution: We develop and deploy a fix
  6. Notification: We inform you of the resolution
  7. Public Disclosure: We coordinate with you to disclose responsibly

Supported Versions

Version Supported
Latest release Yes
Previous minor Security fixes only
Older versions No

We recommend always running the latest version.

Scope

In Scope

  • Authentication and authorization vulnerabilities
  • Data exposure or leakage
  • Injection vulnerabilities (SQL, command, etc.)
  • Cryptographic issues
  • Business logic flaws

Out of Scope

  • Denial of service (DoS) attacks
  • Social engineering
  • Physical security
  • Issues in dependencies (report to upstream)

Security Best Practices

When deploying this application:

  • Never hardcode secrets - Use environment variables or secrets management (e.g., HashiCorp Vault)
  • Keep updated - Regularly update to the latest version
  • Secure configuration - Follow our documentation for secure setup
  • Network security - Use TLS, firewalls, and network segmentation
  • Access control - Apply principle of least privilege

Recognition

We appreciate security researchers who help keep our project secure. With your permission, we'll acknowledge your contribution in our release notes.

Contact

There aren’t any published security advisories