We actively support the following versions of Cross Write with security updates:
Version | Supported |
---|---|
Latest | β |
< Latest | β |
We take security seriously. If you discover a security vulnerability, please follow these steps:
Security vulnerabilities should be reported privately to protect users.
Send details to: [email protected]
Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (if you have them)
- Your contact information
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Investigation: We'll investigate and assess the vulnerability
- Response: We'll provide a timeline for fixes
- Updates: We'll keep you informed of our progress
- Credit: We'll credit you in our security advisories (if desired)
Cross Write implements several security measures:
- OAuth Integration: Secure authentication via Google OAuth
- Magic Link Authentication: Passwordless email authentication
- Session Management: Secure session handling with automatic expiration
- Route Protection: Middleware-based route protection
- Environment Variables: All sensitive data stored in environment variables
- API Key Security: Server-side API key management only
- Database Security: Secure database connections and queries
- Input Validation: Comprehensive input validation using Zod
- HTTPS Only: All communications encrypted in transit
- CSP Headers: Content Security Policy headers implemented
- Rate Limiting: API rate limiting to prevent abuse
- Error Handling: Secure error handling without information leakage
- Keep your environment variables secure
- Use strong, unique passwords for your accounts
- Enable 2FA on your connected platforms
- Regularly review your connected integrations
- Report suspicious activity immediately
- Never commit secrets to version control
- Use environment variables for all sensitive configuration
- Validate all inputs before processing
- Keep dependencies updated regularly
- Follow secure coding practices
Before deploying Cross Write:
- All environment variables are properly configured
- Database connections are secure
- API keys are stored server-side only
- HTTPS is enabled
- CSP headers are configured
- Rate limiting is active
- Error handling doesn't expose sensitive information
- Authentication flows are properly implemented
- Input validation is comprehensive
- Dependencies are up to date
We regularly:
- Monitor dependencies for security vulnerabilities
- Update packages with security patches
- Review code for potential security issues
- Conduct security audits of the codebase
- Test authentication flows for vulnerabilities
For security-related questions or concerns:
- Security Issues: [email protected]
- General Questions: GitHub Issues
- Documentation: README.md
We thank the security researchers and community members who help keep Cross Write secure by responsibly reporting vulnerabilities.
Remember: Security is everyone's responsibility. If you see something, say something!