Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in LinkForty Core, please send an email to:
Please include the following information in your report:
- Description: A clear description of the vulnerability
- Impact: What an attacker could do with this vulnerability
- Reproduction: Step-by-step instructions to reproduce the issue
- Version: The version of LinkForty Core affected
- Suggested Fix: If you have a proposed solution (optional)
- Acknowledgment: We'll acknowledge your email within 48 hours
- Updates: We'll keep you informed about our progress
- Credit: With your permission, we'll credit you in the security advisory
- Timeline: We aim to patch critical vulnerabilities within 7 days
We provide security updates for the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
Our CI/CD pipeline implements several security measures:
- Fork PR Isolation: Pull requests from forks cannot access repository secrets
- Branch Protection: Main branch requires reviews and passing CI checks
- Automated Releases: Only automated releases can publish to NPM
- Provenance: All NPM packages include build provenance
- Secret Scanning: GitHub's secret scanning is enabled
- NPM 2FA: Publishing requires 2-factor authentication
- Provenance: Packages include cryptographic proof of origin
- Dependency Scanning: Dependabot monitors for vulnerable dependencies
- Regular Updates: We keep dependencies up to date
- Input Validation: All user inputs are validated and sanitized
- SQL Injection: We use parameterized queries to prevent SQL injection
- XSS Protection: Output is properly escaped
- Rate Limiting: API endpoints support rate limiting
- Authentication: JWT-based authentication with secure defaults
✅ Do use environment variables for sensitive configuration ✅ Do validate and sanitize all user inputs ✅ Do use parameterized queries for database operations ✅ Do keep dependencies updated ✅ Do review security implications of your changes
❌ Don't commit secrets, API keys, or passwords
❌ Don't use eval() or similar dynamic code execution
❌ Don't trust user input without validation
❌ Don't expose internal error details to users
❌ Don't use outdated or vulnerable dependencies
The following environment variables should be kept secure:
DATABASE_URL- Contains database credentialsREDIS_URL- Contains Redis credentials (if used)JWT_SECRET- Used for token signing- Any custom API keys or secrets
For production deployments:
- Use strong passwords for database and Redis
- Enable SSL/TLS for all connections
- Set secure JWT secret (minimum 32 characters)
- Implement rate limiting to prevent abuse
- Use environment-specific configurations
- Keep the package updated to get security patches
We publish security updates through:
- GitHub Security Advisories: For disclosed vulnerabilities
- NPM Package Updates: Patched versions published to npm
- CHANGELOG.md: Security fixes documented in changelog
- GitHub Releases: Release notes include security information
Subscribe to our releases to stay informed about security updates.
If you have questions about security that don't involve reporting a vulnerability:
- Open a Discussion
- Email: [email protected]
Thank you for helping keep LinkForty Core secure! 🔒