If you discover a security vulnerability in iQ-auth, please report it responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please email:
- Email: [security contact email - to be added]
- Subject:
[SECURITY] iQ-auth Vulnerability Report
Include in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity (critical issues prioritized)
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
- Never commit secrets - Use
.envfiles (not committed to git) - Rotate credentials - Change API keys and secrets regularly
- Use HTTPS - Always use secure connections in production
- Keep updated - Use latest versions for security patches
- No hardcoded secrets - Use environment variables
- Validate inputs - Sanitize all user inputs
- Use dependencies wisely - Audit dependencies for vulnerabilities
- Follow least privilege - Grant minimal required permissions
iQ-auth uses:
- Hashing: SHA-256
- Encryption: AES-256-GCM (when applicable)
- JWT: RS256 or ES256 (asymmetric)
- FIDO2: WebAuthn standard
We follow coordinated vulnerability disclosure:
- Report received and acknowledged
- Vulnerability confirmed and assessed
- Fix developed and tested
- Security advisory published
- Patch released
Security updates will be released as soon as possible:
- Critical: Within 24-48 hours
- High: Within 7 days
- Medium: Within 30 days
- Low: In next regular release
Currently, we do not have a formal bug bounty program. However, we deeply appreciate security researchers who responsibly disclose vulnerabilities and will publicly acknowledge contributions (with permission).
Thank you for helping keep iQ-auth secure! 🔐