| Version | Supported |
|---|---|
| 0.2.x | ✅ |
| 0.1.x | ❌ |
If you discover a security vulnerability in ClubLog HA Bridge, please report it responsibly:
- Do NOT open a public issue
- Email: pentafive@gmail.com with subject "clublog-ha-bridge Security Issue"
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix timeline: Depends on severity, typically 1-4 weeks
- ClubLog API key, email, and Application Password are stored in environment variables (Docker) or HA config (HACS)
- Never commit
.envfiles - only.env.examplewith placeholders - Consider using Docker secrets or a secrets manager in production
- ClubLog auto-deletes API keys found in public repositories
- The bridge connects to ClubLog API (clublog.org) via HTTPS
- The bridge connects to your local MQTT broker (Docker mode only)
- Restrict network access to the bridge container if using Docker
- ClubLog enforces strict rate limits
- Excessive requests result in 403 responses and potential IP firewall blocks
- The bridge respects configured poll intervals and ceases requests on 403
- Do not decrease poll intervals below recommended minimums
- Amateur radio callsigns are inherently public information
- ClubLog data includes DXCC progress and QSO statistics
- No personal data beyond callsigns is transmitted or stored beyond what the API provides
- Debug mode may log API responses containing callsign data
- Keep
DEBUG_MODE=Falsein production - Review logs before sharing in issue reports
This security policy covers:
- The
clublog-ha-bridge.pyscript - The
custom_components/clublog/HACS integration - Docker configuration files
- Example configurations
It does NOT cover:
- ClubLog.org service security
- Home Assistant security
- MQTT broker security