| Version | Supported |
|---|---|
| latest | ✅ |
If you discover a security vulnerability in Baloney, please do not open a public GitHub issue.
Instead, report it privately by emailing security@baloney.app with:
- A description of the vulnerability and its potential impact
- Steps to reproduce or a proof-of-concept
- Any suggested mitigations (optional)
We will acknowledge receipt within 48 hours and aim to resolve confirmed vulnerabilities within 30 days.
We follow coordinated disclosure. We ask that you:
- Give us reasonable time to investigate and patch before public disclosure
- Avoid accessing or modifying user data beyond what is needed to demonstrate the issue
- Not perform denial-of-service or social engineering attacks
We will credit researchers who report valid security issues (with their permission).
- All secrets (API keys, Supabase credentials) must be stored in environment variables — never committed to source control. See
.env.examplefiles for the required variables. - The backend APIs restrict allowed CORS origins via the
ALLOWED_ORIGINSenvironment variable (comma-separated list of permitted origins, defaults tohttps://baloney.app). - The
/api/seedendpoint is protected by aSEED_SECRETenvironment variable and requires the caller to supply a matchingx-seed-secretheader.