We currently support the following versions with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
We take the security of nt-taxoffice-node seriously. If you discover a security vulnerability, please follow these steps:
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report security vulnerabilities by:
- Email: Send details to the repository maintainer
- GitHub Security Advisory: Use the GitHub Security Advisory feature (preferred)
When reporting a vulnerability, please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact and severity assessment
- Any suggested fixes or mitigations (optional)
- Your contact information for follow-up questions
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Fix Timeline:
- Critical vulnerabilities: 7-14 days
- High severity: 14-30 days
- Medium/Low severity: 30-90 days
- Confirmation: We'll confirm the vulnerability and assess its severity
- Development: We'll work on a fix in a private repository
- Testing: We'll thoroughly test the fix to ensure it resolves the issue
- Disclosure: We'll coordinate public disclosure with you
- Release: We'll release a patched version
- Credit: We'll publicly acknowledge your responsible disclosure (unless you prefer to remain anonymous)
- Security updates are released as patch versions (e.g., 1.0.1)
- Critical security fixes may be backported to previous minor versions if necessary
- Security advisories will be published through GitHub Security Advisories
- Users are strongly encouraged to update to the latest version
When deploying nt-taxoffice-node, please follow these security best practices:
- Environment Variables: Never commit
.envfiles or hardcode secrets - Dependencies: Regularly run
npm auditand update dependencies - HTTPS: Always use HTTPS in production environments
- Session Secrets: Use strong, randomly generated session secrets
- Rate Limiting: Keep rate limiting enabled (configured by default)
- Input Validation: Never disable input sanitization
- Database: Use strong database passwords and restrict network access
- Updates: Subscribe to repository notifications for security updates
This project includes several built-in security features:
- Helmet.js: Content Security Policy (CSP) protection
- Rate Limiting: Multiple rate limiters for different endpoints
- Input Sanitization: Comprehensive input validation and sanitization
- Session Security: Secure session configuration with HttpOnly cookies
- Password Hashing: bcrypt with configurable rounds
- XSS Protection: HTML escaping and CSP headers
- SQL Injection Protection: Parameterized database queries
We'd like to thank the following individuals for responsibly disclosing security vulnerabilities:
No reports yet
Last Updated: December 3, 2025