You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/SECURITY.md
+60-95Lines changed: 60 additions & 95 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
-
# Security Policy
1
+
# Security Policy & Incident Response Plan
2
2
3
3
## Our Security Commitment
4
4
5
-
The React Starter Kit team and community take the security of our project seriously. We appreciate the efforts of security researchers and believe that responsible disclosure of security vulnerabilities helps us ensure the security and privacy of all users.
5
+
The React Starter Kit team takes security seriously. We appreciate responsible disclosure of vulnerabilities and are committed to working with security researchers to keep our project secure.
6
6
7
-
We are committed to working with the community to verify, reproduce, and respond to legitimate reported vulnerabilities. Thank you for helping us maintain a secure foundation for modern web applications.
7
+
This document outlines our security policy, incident response procedures, and how to report vulnerabilities.
8
8
9
9
## Scope
10
10
@@ -38,84 +38,59 @@ We provide security updates for the most recent version of React Starter Kit ava
38
38
| main |:white_check_mark:|
39
39
| < main |:x:|
40
40
41
-
## Reporting a Vulnerability
42
-
43
-
**⚠️ Please DO NOT report security vulnerabilities through public GitHub issues, discussions, or pull requests.**
44
-
45
-
Instead, please send a detailed report to: **security@kriasoft.com**
46
-
47
-
To help us triage and validate your report efficiently, please include:
48
-
49
-
### Required Information
41
+
## Incident Response
50
42
51
-
-**Title**: A clear, descriptive summary of the vulnerability
52
-
-**Description**: A detailed explanation of the vulnerability and its potential impact
53
-
-**Affected Component(s)**: Specific files, modules, or features affected (e.g., `apps/api/src/auth.ts`, Better Auth configuration, tRPC procedures)
54
-
-**Steps to Reproduce**:
55
-
1. Clear, numbered steps to reproduce the issue
56
-
2. Include any necessary configuration or environment details
57
-
3. Expected vs. actual behavior
58
-
-**Proof of Concept (PoC)**: Working code, scripts, or screenshots demonstrating the vulnerability
59
-
-**Impact Assessment**: Your assessment of the severity and potential impact:
- Cloudflare Workers: wrangler secret put / dashboard secrets
158
-
- Google Cloud: Secret Manager
159
-
- Ensure `.env.local` and `terraform.tfvars` are in `.gitignore` and never pushed.
160
-
- Browser safety: Never reference server-only secrets in client code. Only expose explicitly public variables intended for the browser (e.g., values with a `PUBLIC_` prefix). Review bundles to ensure no server secrets are included.
161
-
- Rotation and scanning: Rotate secrets regularly and enable secret scanning (GitHub Advanced Security, trufflehog, git-secrets) to prevent accidental leaks.
122
+
### Essential Setup
162
123
163
-
### Authentication
124
+
```bash
125
+
# Check for vulnerabilities
126
+
bun audit
164
127
165
-
- Implement proper session management
166
-
- Use secure password policies
167
-
- Enable multi-factor authentication where appropriate
168
-
- Regularly update Better Auth and related dependencies
128
+
# Enable GitHub security features
129
+
# Settings > Security > Code security and analysis
130
+
# ✓ Dependabot alerts
131
+
# ✓ Secret scanning
132
+
```
169
133
170
-
### Dependencies
134
+
### Secret Management
171
135
172
-
-Regularly run `bun audit` to check for vulnerable dependencies
173
-
-Keep all dependencies up to date
174
-
-Review dependency licenses and security advisories
136
+
-**Never commit secrets** - Use `.env.local` (gitignored) for local development
137
+
-**Production secrets** - Store in Cloudflare Workers secrets or GitHub Actions secrets
138
+
-**Client code** - Only expose `PUBLIC_*` prefixed variables to browser
175
139
176
-
### Deployment
140
+
### Key Commands
177
141
178
-
- Use HTTPS for all production deployments
179
-
- Implement proper CORS policies
180
-
- Enable security headers (CSP, HSTS, etc.)
181
-
- Regular security audits of your deployed applications
142
+
```bash
143
+
bun audit # Check dependencies
144
+
bun test:security # Run security tests (if configured)
0 commit comments