The ADMENSION team takes security seriously. If you discover a security vulnerability, please follow these guidelines:
- Open a public GitHub issue
- Discuss the vulnerability publicly before it's fixed
- Exploit the vulnerability beyond what's necessary to demonstrate it
- Email us privately: security@garebear99.dev
- Use GitHub Security Advisory: Create a private security advisory
- Include detailed information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if you have one)
- Your contact information for follow-up
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity (see below)
- Remote code execution
- Authentication bypass
- Exposure of sensitive user data
- Financial fraud vectors
- XSS vulnerabilities
- CSRF vulnerabilities
- Unauthorized access to admin functions
- Payout calculation manipulation
- Information disclosure
- Denial of service
- Rate limiting bypass
- Minor information leaks
- Non-critical UI issues
- Best practice improvements
- Use strong, unique wallet addresses
- Don't share your admin PIN
- Be cautious of phishing attempts
- Keep your browser updated
- Report suspicious activity
- Never commit API keys, secrets, or credentials
- Use environment variables for sensitive data
- Follow secure coding practices
- Validate all user inputs
- Sanitize outputs to prevent XSS
- Test AdSense policy compliance
ADMENSION implements several security measures:
- No Server-Side Data Storage: All user data stored locally in browser
- Rate Limiting: Prevents spam and abuse
- IVT Filtering: Invalid traffic detection
- Input Validation: All user inputs sanitized
- XSS Prevention: Proper output encoding
- HTTPS Only: All connections encrypted
- No PII Collection: Privacy-first design
- Admin PIN Protection: Access control for sensitive functions
- User data (links, wallets) stored in browser localStorage
- Users should backup data (export JSON feature)
- Clearing browser data will delete all links
- Collector endpoint is public (required for tracking)
- Rate limiting prevents abuse
- No sensitive data transmitted
- IVT validation on server side
- Third-party ads may load external content
- Google's security policies apply
- Ad content reviewed by Google
- Automated via GitHub Actions
- Requires repository secrets
- Wallet cap prevents concentration
- Transparent overflow redistribution
This security policy was last updated: January 2026
We will notify users of any security-related updates via:
- GitHub Security Advisories
- Release notes
- README updates (for critical issues)
- Security Email: security@garebear99.dev
- GitHub Security Advisory: Submit Private Advisory
- General Issues: GitHub Issues (non-security only)
We appreciate security researchers who help make ADMENSION safer:
- Responsible disclosure will be credited (with permission)
- Significant findings will be acknowledged in release notes
- Hall of fame for contributors (coming soon)
By participating in our security disclosure program, you agree to:
- Act in good faith to avoid privacy violations, service disruption, and data destruction
- Only test on your own accounts or with explicit permission
- Not exploit vulnerabilities beyond demonstrating the issue
- Give us reasonable time to fix issues before public disclosure
Thank you for helping keep ADMENSION secure! π