We release security updates for the following versions:
| Version | Supported |
|---|---|
| 2.x.x | ✅ |
| 1.x.x | ❌ |
We take the security of Nimbly seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Open a public GitHub issue
- Discuss the vulnerability in public forums, social media, or mailing lists
- Email us at security@nimbly.dev (or create a GitHub security advisory)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Wait for our response (we aim to respond within 48 hours)
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Investigation: We'll investigate and keep you updated
- Fix: If valid, we'll work on a fix and security advisory
- Credit: We'll credit you in the security advisory (unless you prefer to remain anonymous)
- Disclosure: We'll coordinate the disclosure timeline with you
When using Nimbly in production:
- Never commit sensitive credentials to version control
- Use environment variables or secrets management tools
- Rotate credentials regularly
# Bad - Don't do this!
AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE
# Good - Use environment variables
export AWS_ACCESS_KEY_ID=$(vault read secret/aws/access_key)- Store API keys in secure vaults (AWS Secrets Manager, HashiCorp Vault)
- Use IAM roles and service accounts when possible
- Implement key rotation policies
- Run backend API behind a firewall
- Use HTTPS/TLS for all communications
- Implement rate limiting and DDoS protection
- Enable encryption at rest and in transit
- Use parameterized queries (we do this by default)
- Implement regular backups
- Restrict database access by IP
- Use strong, unique passwords
- Enable two-factor authentication
- Implement proper RBAC (Role-Based Access Control)
- Audit access logs regularly
- Use official base images
- Scan images for vulnerabilities
- Run containers as non-root users
- Keep dependencies updated
# Good practice in Dockerfile
USER node
RUN npm audit fix- Enable audit logging
- Monitor for suspicious activity
- Set up alerts for security events
- Regularly review logs
- Mock Provider: Not suitable for production use
- Beta Features: May have undiscovered security issues
- Third-party Integrations: We're not responsible for security of integrated services
Subscribe to security updates:
- GitHub: Watch this repository with "All Activity" notifications
- Email: Subscribe to our security mailing list
- RSS: Follow our security advisory feed
Nimbly helps you meet compliance requirements:
- SOC 2 Type II: Audit trail and access controls
- GDPR: Data protection and privacy features
- HIPAA: Encryption and access logging (when properly configured)
We follow the principle of responsible disclosure:
- Report sent to security team
- Team acknowledges within 48h
- Investigation and fix development
- Coordinated disclosure with reporter
- Public advisory published
- CVE assigned (if applicable)
🚀 Coming Soon! We're working on launching a bug bounty program to reward security researchers.
- Security Email: security@nimbly.dev
- Security Advisories: GitHub Security Advisories
- PGP Key: Available upon request
Thank you for helping keep Nimbly and our users safe! 🔐