Use this section to tell people about which versions of your project are currently being supported with security updates.
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of OS Portfolio seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to security@yourdomain.com.
You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
- Type of issue (buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the vulnerability
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
This information will help us triage your report more quickly.
We prefer all communications to be in English.
When we receive a security bug report, we will assign it to a primary handler. This person will coordinate the fix and release process, involving the following steps:
- Confirm the problem and determine the affected versions.
- Audit code to find any similar problems.
- Prepare fixes for all supported versions. These fixes will be released as fast as possible to the public.
If you have suggestions on how this process could be improved please submit a pull request.
- Never commit sensitive information (API keys, passwords, etc.)
- Use environment variables for configuration
- Validate all user inputs
- Follow secure coding practices
- Keep dependencies updated
- Keep your environment variables secure
- Regularly update the application
- Use HTTPS in production
- Monitor for security updates
- Report vulnerabilities promptly
Before deploying to production, ensure:
- All environment variables are properly set
- HTTPS is enabled
- Dependencies are up to date
- No sensitive data is exposed in logs
- Input validation is in place
- Error messages don't leak sensitive information
- Authentication is properly implemented
- CORS is configured correctly
- Rate limiting is in place
- Security headers are set
We would like to thank all security researchers and contributors who help keep OS Portfolio secure by reporting vulnerabilities and following responsible disclosure practices.