This repository contains a local-first system that handles sensitive data (credentials, secrets, and audit traces). Security is a mandatory requirement.
| Version | Security support |
|---|---|
main |
β Active |
| Legacy branches |
If you discover a vulnerability:
- Do not open a public issue with exploitable details.
- Use GitHub Security Advisory for this repository.
- Provide reproduction steps, impact, and possible mitigations.
- Initial triage: within 48-72 hours after report receipt
- Severity classification: based on impact and exploitability
- Fixing: prioritized by risk level
- Disclosure: coordinated after a patch is available
- Never commit real secrets (
.env, tokens, keys). - Keep server-side validation with Zod.
- Preserve CSRF protection on mutable endpoints.
- Ensure sensitive data does not leak into logs/responses.
- Update security-related tests when touching critical flows.
- Password hashing with
bcrypt AES-256-GCMencryption for secrets and backup artifacts- HMAC-signed sessions
- CSRF protection on
POST/PUT/DELETE - Re-authentication required to reveal secrets
- Audit logging for critical operations