At BrowsePing, we take the security of our users and their data very seriously. As an open-source browser extension that handles user browsing data and social interactions, we are committed to maintaining the highest security standards to protect our community.
We actively maintain and provide security updates for the following versions:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < 1.0 | ❌ |
We strongly recommend always using the latest version of BrowsePing to ensure you have all security patches and updates.
We appreciate the security research community's efforts in responsibly disclosing vulnerabilities. If you discover a security vulnerability in BrowsePing, please help us protect our users by reporting it responsibly.
If you've found a critical security vulnerability, please report it privately through one of the following methods:
- Email: support@browseping.com
- Subject: "SECURITY: [Brief Description]"
For critical or urgent security issues, you can contact the lead maintainer directly:
- Email: akashkumar.dev00@gmail.com
- Subject: "URGENT SECURITY: [Brief Description]"
Please provide as much information as possible to help us understand and resolve the issue quickly:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Affected versions (if known)
- Suggested fix (if you have one)
- Your contact information for follow-up questions
Subject: SECURITY: XSS Vulnerability in Message Display
Description:
A cross-site scripting (XSS) vulnerability exists in the message display
component that could allow malicious users to execute arbitrary JavaScript.
Steps to Reproduce:
1. Create a new message with the payload: <script>alert('XSS')</script>
2. Send the message to another user
3. When the recipient opens the message, the script executes
Impact:
High - Could allow attackers to steal session tokens or perform actions
on behalf of users.
Affected Versions:
Tested on v1.2.0, likely affects earlier versions.
Contact:
researcher@example.com
We are committed to responding promptly to security reports:
- Initial Response: Within 24-48 hours of receiving your report
- Status Update: Within 5 business days with our assessment and planned action
- Resolution: We aim to release patches for critical vulnerabilities within 7-14 days
- Acknowledgment: We'll acknowledge receipt of your vulnerability report
- Investigation: Our team will investigate and validate the issue
- Mitigation: We'll develop and test a fix
- Release: We'll release a security patch and update affected users
- Disclosure: After the patch is deployed, we may publicly disclose the vulnerability (with credit to you, if desired)
If you're contributing to BrowsePing, please follow these security guidelines:
- Never commit secrets: No API keys, passwords, or tokens in the code
- Validate all inputs: Sanitize and validate user inputs to prevent injection attacks
- Use secure dependencies: Keep dependencies up to date and audit for vulnerabilities
- Follow secure coding practices: Use parameterized queries, avoid eval(), sanitize HTML
- Handle errors gracefully: Don't expose sensitive information in error messages
- Minimize data collection: Only collect data that's necessary
- Encrypt sensitive data: Use encryption for sensitive information in transit and at rest
- Respect user privacy: Follow our privacy policy and obtain proper consent
- Secure storage: Use browser's secure storage APIs appropriately
- Secure session management: Implement proper token handling and expiration
- HTTPS only: All API communications must use HTTPS
- Proper authentication: Implement strong authentication mechanisms
- Least privilege: Request only necessary browser permissions
We follow responsible disclosure practices:
- We will work with you to understand and address the vulnerability
- We ask that you give us reasonable time to fix the issue before public disclosure
- We will credit you for the discovery (unless you prefer to remain anonymous)
- We will publicly acknowledge your contribution once the fix is deployed
Our extension implements several security measures:
- Content Security Policy (CSP): Prevents XSS attacks
- Permission-based access: Requests only necessary browser permissions
- Secure API communication: All communications with backend use HTTPS
- Token-based authentication: Secure JWT-based authentication system
- Data encryption: Sensitive data is encrypted in transit
- Regular security audits: We regularly review our codebase for vulnerabilities
As a browser extension that tracks browsing activity:
- Local data storage: Some data is stored locally in the browser
- Tab monitoring: The extension monitors active tabs with user consent
- WebSocket connections: Real-time features use WebSocket connections
- Third-party dependencies: We regularly audit and update dependencies
While we don't currently have a formal bug bounty program, we deeply appreciate security researchers' efforts. We recognize contributors who help us improve security:
- Public acknowledgment (if desired)
- Recognition in our security hall of fame
- Potential rewards for critical vulnerability discoveries
- Subscribe to updates: Watch our GitHub repository for security advisories
- Follow us: Stay informed through our Discord community
- Check regularly: Review our changelog for security patches
For general security questions or concerns:
- Email: support@browseping.com
- Discord: Join our community
- Website: browseping.com
- Twitter/X: @BrowsePing
For critical security vulnerabilities, always use email and mark as "SECURITY" in the subject line.
Thank you for helping keep BrowsePing and our community safe!
Last Updated: January 3, 2026