We take the security of Graphora seriously. If you discover a security vulnerability, please follow these steps:
Please do not report security vulnerabilities through public GitHub issues, discussions, or pull requests.
Send your vulnerability report to: support@graphora.io
Include the following information:
- Type of vulnerability
- Full paths of source files related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability
- Any potential mitigations you've identified
- Acknowledgment: We'll acknowledge receipt within 48 hours
- Updates: We'll keep you informed about our progress
- Timeline: We aim to provide an initial assessment within 7 days
- Fix: Critical issues will be addressed immediately; others within 30 days
- Disclosure: We'll coordinate with you on public disclosure timing
We request that you:
- Allow us reasonable time to fix the vulnerability before public disclosure
- Avoid exploiting the vulnerability or sharing it with others
- Do not access, modify, or delete data that isn't yours
- Act in good faith and avoid privacy violations
If you responsibly disclose a security issue:
- We'll acknowledge you in our security advisory (unless you prefer to remain anonymous)
- We may offer a bounty for critical vulnerabilities (case-by-case basis)
| Version | Supported |
|---|---|
| main | ✅ |
| < 1.0 | ❌ |
We currently support only the latest version. Security fixes will be backported on a case-by-case basis for critical issues.
When deploying Graphora Frontend:
- Use strong authentication (Clerk is configured by default)
- Rotate API keys regularly
- Use environment variables for all secrets
- Never commit
.envfiles
- Use HTTPS in production
- Configure CORS properly
- Implement rate limiting
- Use secure headers (CSP, HSTS, etc.)
- Regularly update dependencies
- Monitor for security advisories
- Use
npm auditto check for vulnerabilities - Review dependency licenses
- Sanitize user inputs
- Use parameterized queries
- Implement proper access controls
- Encrypt sensitive data at rest
- Use secure CI/CD pipelines
- Scan container images for vulnerabilities
- Follow principle of least privilege
- Enable logging and monitoring
- User data is processed client-side
- Ensure sensitive data is not exposed in browser storage
- Validate all inputs before sending to backend
- Never expose API keys in client-side code
- Use server-side API routes for sensitive operations
- Rotate keys if compromised
- Use read-only connections where possible
- Sanitize Cypher queries to prevent injection
- Implement query timeouts
Security updates will be announced through:
- GitHub Security Advisories
- Release notes
- Email to registered users (if applicable)
- Security Issues: support@graphora.io
- General Questions: See SUPPORT.md
Thank you for helping keep Graphora secure!