Use this section to tell people about which versions of your project are currently being supported with security updates.
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security vulnerability in Slack Channel Cleaner, please follow these steps:
Security vulnerabilities should be reported privately to avoid potential exploitation.
Send an email to the maintainer with the following information:
- Subject:
[SECURITY] Vulnerability in Slack Channel Cleaner - Description: Detailed description of the vulnerability
- Steps to reproduce: Clear steps to reproduce the issue
- Impact: Potential impact of the vulnerability
- Suggested fix: If you have ideas for fixing the issue
- Initial response: Within 48 hours
- Assessment: Within 1 week
- Fix timeline: Depends on severity and complexity
- Security vulnerabilities will be disclosed through GitHub Security Advisories
- Patches will be released as soon as possible
- Users will be notified through releases and documentation updates
-
Keep your Slack token secure
- Never commit your
.envfile to version control - Use environment variables in production
- Rotate tokens regularly
- Never commit your
-
Review skip lists
- Ensure important channels are in your skip list
- Regularly review and update the skip list
-
Use the latest version
- Always use the latest stable release
- Subscribe to security notifications
-
Code review
- All code changes are reviewed for security implications
- Pay special attention to API integrations and user input
-
Dependencies
- Keep dependencies updated
- Monitor for known vulnerabilities
- Use
go mod tidyandgo mod verify
-
Testing
- Test with various input scenarios
- Include security-focused test cases
- Test error handling and edge cases
- The application requires a workspace API token with specific scopes
- Tokens are stored in environment variables or
.envfiles - Never log or display tokens in the application
- The application handles workspace API rate limits automatically
- This prevents potential API abuse and account suspension
- All user inputs are validated before processing
- Configuration files are validated for correct format and values
- Configuration files should have appropriate permissions
.envfiles should be readable only by the user running the application
- Skip List: Protects important channels from accidental removal
- Confirmation: Double-confirmation for destructive actions
- Error Handling: Graceful handling of API errors and rate limits
- Input Validation: Validation of all configuration and user inputs
- Rate Limiting: Automatic handling of workspace API rate limits
- Token Security: Secure token storage and usage
- Error Handling: Proper error handling without exposing sensitive information
If you find a security vulnerability, please report it to:
Email: [Your email address]
Subject: [SECURITY] Vulnerability in Slack Channel Cleaner
Please include:
- Detailed description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
Security updates will be:
- Released as patch versions (e.g., 1.0.1, 1.0.2)
- Announced through GitHub releases
- Documented in the changelog
- Tagged with security advisories when appropriate
Thank you for helping keep Slack Channel Cleaner secure! 🔒