We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 2.1.x | ✅ |
| 2.0.x | ✅ |
| < 2.0 | ❌ |
The NexusHome IoT team takes security vulnerabilities seriously. We appreciate your efforts to responsibly disclose your findings.
Please report security vulnerabilities by emailing [email protected] or directly to [email protected]
Do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.
To help us triage and fix the issue quickly, please include:
- Type of vulnerability (e.g., SQL injection, XSS, authentication bypass)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Initial Response: Within 48 hours of report
- Confirmation: Within 5 business days
- Fix Release: Depends on severity
- Critical: Within 7 days
- High: Within 14 days
- Medium: Within 30 days
- Low: Next scheduled release
- Acknowledgment: We will acknowledge receipt of your vulnerability report
- Investigation: We will investigate and confirm the vulnerability
- Updates: We will keep you informed about our progress
- Fix: We will develop and test a fix
- Release: We will release the fix and publicly disclose the vulnerability
- Credit: We will credit you in our security advisories (unless you prefer to remain anonymous)
When deploying NexusHome IoT, follow these security best practices:
- Use strong JWT secret keys (minimum 32 characters)
- Enable multi-factor authentication when available
- Rotate API keys regularly
- Never commit secrets to version control
- Always use HTTPS in production
- Configure proper CORS policies
- Implement rate limiting
- Use firewall rules to restrict access
- Keep MQTT communication encrypted
- Use strong database passwords
- Enable database encryption at rest
- Restrict database access to application servers only
- Regularly backup and encrypt backups
- Keep SQL Server updated with latest security patches
- Keep all dependencies updated
- Run security scans regularly
- Monitor application logs for suspicious activity
- Implement proper input validation
- Use parameterized queries to prevent SQL injection
- Use container image scanning
- Implement least privilege access
- Enable audit logging
- Regular security audits
- Keep Docker and Kubernetes updated
- Use device certificate authentication
- Implement secure device provisioning
- Monitor device behavior for anomalies
- Regular firmware updates
- Isolate IoT devices on separate network segments
- Change all default passwords before deployment
- Update JWT secret keys from example values
- Configure proper authentication for MQTT broker
- Review and adjust rate limiting thresholds
- User passwords are hashed using BCrypt
- Sensitive data is encrypted in transit (TLS/SSL)
- Database connections use encrypted channels
- Session tokens expire after configured period
We regularly monitor and update our dependencies for security vulnerabilities using:
- GitHub Dependabot
- NuGet package vulnerability scanning
- Regular security audits
Security updates are released as:
- Patch versions (2.1.x) for backward-compatible security fixes
- Security advisories published on GitHub
- Release notes documenting security improvements
Subscribe to repository releases to receive notifications about security updates.
NexusHome IoT implements security controls aligned with:
- OWASP Top 10
- CWE/SANS Top 25
- NIST Cybersecurity Framework
- IoT Security Foundation guidelines
We recognize security researchers who have helped improve NexusHome IoT security:
(Contributors will be listed here with their permission)
For security-related questions that are not vulnerabilities:
- Email: [email protected]
- GitHub Discussions: Security category
- Documentation: /docs/SECURITY_GUIDE.md
We follow a coordinated disclosure approach:
- Security issues are fixed privately
- Patches are released to supported versions
- Public disclosure occurs after fixes are available
- Security advisories provide detailed information
We are considering establishing a bug bounty program. Stay tuned for updates.
Thank you for helping keep NexusHome IoT and our users secure!