Trainium is actively maintained. Security updates are provided for the following versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We recommend always using the latest release.
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in Trainium, please report it responsibly:
-
Private disclosure — Open a GitHub Security Advisory (preferred), or contact the maintainers privately via your preferred channel listed in the repository.
-
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Your contact information for follow-up
-
Response — We aim to acknowledge reports within 48 hours and provide an initial assessment within 7 days.
-
Disclosure — We will coordinate with you on disclosure timing. We appreciate your patience and responsible disclosure.
- Authentication and authorization bypass
- SQL injection, XSS, CSRF
- Sensitive data exposure (credentials, tokens, PII)
- Payment-related vulnerabilities (Stripe, Toss Payments integration)
- Privilege escalation (admin/staff access)
- Socket.IO or real-time notification abuse
- Issues in dependencies (report upstream; we will update dependencies)
- Social engineering or physical attacks
- Denial of service requiring significant resources
- Issues in third-party services (Stripe, Toss, Resend, etc.)
- Authentication: NextAuth.js with JWT, bcrypt for passwords
- API: Session validation, role-based access control, Zod input validation
- Database: Prisma ORM (parameterized queries)
- Payments: Server-side intent creation, webhook validation, idempotency
- File uploads: Type validation, size limits, path traversal prevention
Thank you for helping keep Trainium and its users safe.