Security is at the core of this Risk Assessment Tool. We take security seriously and appreciate the security research community's efforts in responsibly disclosing vulnerabilities.
- No Backend: This is a fully client-side application
- No Data Collection: No personal data is collected or transmitted
- Local Storage Only: All assessment data stays in your browser
- Optional Export: Users can export data for backup purposes
We value security researchers who help keep our users safe. If you discover a security vulnerability, please follow these guidelines:
- Do NOT open a public GitHub issue for security vulnerabilities
- Do NOT disclose the vulnerability publicly until it has been addressed
- Do email us at: security@blacksmithinfosec.com
Please include the following information:
- Description: Clear description of the vulnerability
- Impact: What could an attacker accomplish?
- Steps to Reproduce: Detailed steps to reproduce the issue
- Proof of Concept: Code or screenshots demonstrating the vulnerability
- Affected Versions: Which versions are affected?
- Suggested Fix: If you have ideas for remediation
- Your Details: Name/handle and contact info for credit (optional)
Subject: [SECURITY] XSS vulnerability in domain scanner results
Description:
Cross-site scripting vulnerability in the domain scanner result display allows
execution of arbitrary JavaScript.
Impact:
An attacker could craft a malicious domain response that executes JavaScript
in the victim's browser, potentially stealing localStorage data.
Steps to Reproduce:
1. Set up a malicious DNS server responding with: <script>alert(1)</script>
2. Enter the malicious domain in the scanner
3. Run the scan
4. Observe JavaScript execution when results are displayed
Proof of Concept:
[Attached screenshot or code sample]
Affected Versions:
Latest version (commit abc123)
Suggested Fix:
Sanitize all domain scan results before displaying in the UI using DOMPurify
or React's built-in XSS protection.
Reporter:
Jane Doe (@janedoe)
contact@example.com
When you report a vulnerability:
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Communication: We'll keep you updated on our progress
- Timeline: We aim to address critical issues within 7 days
- Credit: We'll credit you in the fix (unless you prefer to remain anonymous)
- Disclosure: We'll coordinate public disclosure timing with you
- Critical vulnerabilities: 48-72 hours
- High severity: 7 days
- Medium severity: 14 days
- Low severity: 30 days
We use the following severity levels:
Critical:
- Remote code execution
- Authentication bypass
- Data exfiltration from localStorage
High:
- Cross-site scripting (XSS)
- CSRF allowing state changes
- Privilege escalation
Medium:
- Information disclosure
- Denial of service
- Missing security headers
Low:
- Best practice violations
- Low-impact information leaks
- Keep Updated: Always use the latest version from GitHub Pages
- Verify URL: Ensure you're on
https://assess.blacksmithinfosec.com - Clear Data: Use the Reset button to clear sensitive data when done
- Export Carefully: Be cautious when exporting data - it may contain sensitive information
- Browser Security: Keep your browser up to date
- Private Browsing: Consider using private/incognito mode for sensitive assessments
- Validate Inputs: Always validate and sanitize user inputs
- Review Dependencies: Check for known vulnerabilities in npm packages
- Follow Guidelines: Adhere to our CONTRIBUTING.md
- Test Security: Include security tests for new features
- Avoid Secrets: Never commit API keys, tokens, or credentials
- Code Review: All PRs require review before merging
- CORS Limitations: Some scans use CORS proxies to access external APIs
- Client-Side Only: All processing happens in the browser - no server-side validation
- Rate Limits: External API rate limits may affect scan functionality
- Browser Compatibility: Requires modern browser with localStorage support
The following are not considered security vulnerabilities:
- Denial of service via local resource exhaustion (it's client-side)
- Issues requiring physical access to the user's device
- Social engineering attacks
- Vulnerabilities in third-party APIs we consume (report to them directly)
- Rate limit bypass (we provide rate limiting as a courtesy, not security)
- Browser-specific bugs (report to browser vendors)
Security updates will be:
- Patched immediately in the
mainbranch - Deployed to GitHub Pages as soon as the fix is merged to
main - Documented in release notes with CVE (if applicable)
- Announced via GitHub Security Advisories
We regularly perform:
- Dependency scanning: Automated via Dependabot
- Static analysis: ESLint with security rules
- Code review: All changes reviewed before merge
- Testing: Comprehensive test suite including security tests
- Security Issues: security@blacksmithinfosec.com
- General Questions: https://github.com/blacksmith-infosec/risk-assessments/issues
- Website: https://blacksmithinfosec.com
We currently do not offer a bug bounty program, but we deeply appreciate security research contributions and will:
- Publicly credit researchers (with permission)
- Provide detailed acknowledgment in release notes
- Consider featuring exceptional findings in our blog
We thank the following security researchers for responsibly disclosing vulnerabilities:
No vulnerabilities reported yet - be the first!
Last Updated: October 31, 2025
Thank you for helping keep our users safe! 🛡️
Built with ❤️ by Blacksmith InfoSec