We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of PharmaSys seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Do not open a public GitHub issue for security vulnerabilities
- Do not disclose the vulnerability publicly until we've had a chance to address it
- Do not exploit the vulnerability beyond what is necessary to demonstrate it
Please report security vulnerabilities by emailing: [INSERT SECURITY EMAIL]
In your report, please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any possible mitigations you've identified
- Your contact information for follow-up questions
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Assessment: We will investigate and assess the severity of the issue
- Updates: We will keep you informed of our progress
- Resolution: We will work to fix the vulnerability as quickly as possible
- Disclosure: Once fixed, we will coordinate disclosure with you
- Initial Response: Within 48 hours
- Status Update: Within 5 business days
- Fix Timeline: Depends on severity
- Critical: 1-7 days
- High: 7-14 days
- Medium: 14-30 days
- Low: 30-90 days
When contributing to or using PharmaSys, please follow these security best practices:
-
Never commit sensitive data
- API keys
- Passwords
- Access tokens
- Private keys
- Environment files with credentials
-
Use environment variables
- Store secrets in
.envfiles (never commit these) - Use
.env.examplefor templates - Keep production credentials separate
- Store secrets in
-
Validate all inputs
- Sanitize user input
- Validate data types
- Use parameterized queries
- Prevent SQL injection
-
Follow authentication best practices
- Use Supabase Auth properly
- Implement Row Level Security (RLS)
- Never bypass authentication checks
- Use secure session management
-
Keep dependencies updated
- Regularly update npm packages
- Monitor security advisories
- Use
yarn auditto check for vulnerabilities - Address high/critical vulnerabilities promptly
-
Implement proper error handling
- Don't expose sensitive error details to users
- Log errors securely
- Use generic error messages in production
-
Use HTTPS
- Always use HTTPS in production
- Don't transmit sensitive data over HTTP
- Use secure cookies
-
Secure your environment
- Use strong passwords
- Enable two-factor authentication
- Restrict database access
- Use Supabase RLS policies
-
Regular updates
- Keep the application updated
- Apply security patches promptly
- Monitor release notes
-
Database security
- Use Row Level Security (RLS)
- Limit database permissions
- Regular backups
- Audit access logs
-
Monitor for suspicious activity
- Check application logs
- Monitor authentication attempts
- Set up alerts for unusual patterns
- We use Supabase Authentication
- Row Level Security (RLS) is enforced on all tables
- Session tokens are stored securely
- Password reset flows follow best practices
- Sensitive data is encrypted at rest (Supabase default)
- API calls use HTTPS
- User passwords are hashed (handled by Supabase Auth)
- Personal data follows privacy regulations
- Regular dependency audits via
yarn audit - Automated dependency updates via Dependabot
- Review security advisories
- Hosted on Supabase (SOC 2 Type II certified)
- Database backups are automated
- DDoS protection via Supabase infrastructure
Required security-related environment variables:
# Supabase Configuration (required)
VITE_SUPABASE_URL=your-supabase-url
VITE_SUPABASE_ANON_KEY=your-anon-key
# Never commit these values!
# Use different values for dev/staging/productionWe recommend implementing a Content Security Policy (CSP) in production deployments.
- API endpoints should restrict CORS to trusted origins
- Supabase configuration handles CORS for backend
PharmaSys aims to comply with:
- GDPR: For data privacy (if applicable)
- HIPAA: For healthcare data (if applicable)
- SOC 2: Via Supabase infrastructure
Note: Compliance requirements may vary based on your deployment and use case.
We regularly monitor security advisories for:
- React
- TypeScript
- Vite
- All npm dependencies
Run yarn audit to check for known vulnerabilities.
Security patches will be:
- Released as quickly as possible
- Documented in release notes
- Announced in GitHub Security Advisories
- Tagged with severity level
Currently, we do not have a formal bug bounty program. However, we greatly appreciate responsible disclosure and will acknowledge contributors in our security advisories.
If you have questions about security that aren't related to a specific vulnerability, please:
- Check existing Discussions
- Open a new discussion in the Security category
- Contact the maintainers
We would like to thank the following individuals for responsibly disclosing security issues:
No vulnerabilities have been reported yet.
Last Updated: 2025-11-08
We review and update this security policy regularly to ensure it remains current and effective.