Skip to content

Security: Teyoh-org/exact-online-client

Security

SECURITY.md

Security Policy

Supported Versions

We provide security updates for the following versions:

Version Supported
1.0.x
< 1.0

Reporting a Vulnerability

We take security vulnerabilities seriously. If you discover a security vulnerability, please follow these steps:

  1. Do NOT create a public GitHub issue
  2. Email security details to: [security@yteyoh.com]
  3. Include:
    • Description of the vulnerability
    • Steps to reproduce
    • Potential impact
    • Suggested fix (if any)

What to Report

  • Authentication/authorization bypasses
  • SQL injection vulnerabilities
  • Cross-site scripting (XSS)
  • Sensitive data exposure
  • Insecure token storage or transmission
  • Rate limiting bypasses
  • Any security-related issues

What NOT to Report

  • Missing security headers (unless exploitable)
  • Informational disclosure of non-sensitive data
  • Denial of service (DoS) issues
  • Issues requiring physical access
  • Social engineering attacks

Response Timeline

  • Initial Response: Within 48 hours
  • Status Update: Within 7 days
  • Fix Timeline: Depends on severity
    • Critical: 7 days
    • High: 30 days
    • Medium: 90 days
    • Low: Next release

Security Best Practices

When using this library:

  1. Never commit credentials - Use environment variables or secrets management
  2. Use HTTPS - Always use HTTPS in production
  3. Keep dependencies updated - Regularly update dependencies
  4. Validate input - Always validate and sanitize user input
  5. Use strong secrets - Use strong, randomly generated client secrets
  6. Monitor tokens - Monitor token expiration and refresh
  7. Limit access - Use principle of least privilege
  8. Audit logs - Enable logging and monitor for suspicious activity

Security Updates

Security updates will be:

  • Released as patch versions (e.g., 1.0.1)
  • Documented in CHANGELOG.md
  • Announced in release notes

Acknowledgments

We thank security researchers who responsibly disclose vulnerabilities. Contributors will be credited (with permission) in security advisories.

There aren’t any published security advisories