We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
We take the security of CV AI Enhancer seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- Open a public GitHub issue
- Discuss the vulnerability publicly
- Share the vulnerability with others until it has been resolved
-
Email us directly with:
- A clear description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any suggested fixes (if you have them)
-
Include details:
- Affected versions
- Environment details (OS, Node.js version, etc.)
- Proof of concept (if applicable)
- Any additional context
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Initial Assessment: We will provide an initial assessment within 7 days
- Updates: We will keep you informed of our progress
- Resolution: We will work to resolve the issue as quickly as possible
- We will work with you to understand and resolve the issue quickly
- We will credit you for the discovery (if you wish)
- We will not disclose your identity without your permission
- We will notify you before public disclosure
When using CV AI Enhancer, please follow these security best practices:
- Environment Variables: Never commit
.envfiles or expose API keys - Supabase Keys: Keep
SUPABASE_SERVICE_ROLE_KEYsecret - never expose it client-side - OpenAI API Key: Keep your OpenAI API key secure and use environment variables
- Trigger.dev Keys: Keep
TRIGGER_SECRET_KEYsecret - Database: Use strong passwords and enable Row Level Security (RLS) policies
- Updates: Keep dependencies up to date
- Authentication: Always use Supabase Auth for user authentication
- Authorization: Rely on RLS policies for data access control
- API Keys: All API keys should be stored in environment variables, never in code
- Service Role Keys: The Supabase service role key bypasses RLS - use with caution
- Client-Side Code: Only
NEXT_PUBLIC_*variables are safe to expose in client-side code - File Uploads: Validate file types and sizes for uploaded CVs and images
- SQL Injection: Use Prisma ORM to prevent SQL injection (never use raw SQL with user input)
Security updates will be released as patches to the latest version. We recommend:
- Keeping dependencies up to date
- Reviewing security advisories for dependencies
- Monitoring the repository for security updates
If you have questions about security, please:
- Review the documentation
- Check existing issues
- Contact us at [INSERT CONTACT EMAIL] (for non-security questions)
Thank you for helping keep CV AI Enhancer and its users safe!