We actively support the following versions of DiagnosticoX with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
IMPORTANT: Please do NOT report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability in DiagnosticoX, please report it responsibly:
-
Email Security Team: Send details to [security@diagnosticox.com] (or repository maintainer)
-
Include Details:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Your contact information
-
Wait for Response: We will acknowledge receipt within 48 hours
-
Coordinated Disclosure: We will work with you on a coordinated disclosure timeline
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Status Updates: Every 7 days until resolved
- Fix Timeline: Critical issues within 14 days, others within 30 days
- Public Disclosure: After fix is deployed and coordinated with reporter
-
Environment Variables
- Never commit
.envfiles to version control - Use strong, unique API keys
- Rotate credentials regularly
- Store secrets securely (e.g., password managers, secret management services)
- Never commit
-
API Keys
- Restrict API key permissions to minimum required
- Use different keys for development and production
- Monitor API usage for anomalies
- Revoke compromised keys immediately
-
Patient Data (PHI/PII)
- NEVER use real patient data in development or testing
- Always use synthetic or anonymized data
- Comply with HIPAA, GDPR, and local regulations
- Implement proper access controls
- Encrypt sensitive data at rest and in transit
-
Authentication
- Use strong passwords (minimum 12 characters)
- Enable multi-factor authentication (MFA)
- Implement session timeout
- Use secure session storage
-
Updates
- Keep DiagnosticoX updated to latest version
- Update dependencies regularly
- Monitor security advisories
-
Code Security
- Follow secure coding practices
- Avoid SQL injection, XSS, CSRF vulnerabilities
- Sanitize all user inputs
- Use prepared statements for database queries
- Implement rate limiting
-
Dependency Management
- Run
pnpm auditregularly - Update dependencies with known vulnerabilities
- Review dependency licenses
- Minimize dependency count
- Run
-
Authentication & Authorization
- Implement proper RBAC (Role-Based Access Control)
- Use JWT with short expiration times
- Validate tokens on every request
- Implement refresh token rotation
-
Data Encryption
- Use HTTPS/TLS for all communications
- Encrypt sensitive data at rest (AES-256)
- Use secure key management
- Implement proper certificate validation
-
Logging & Monitoring
- Log security events
- Monitor for suspicious activity
- Implement alerting for security incidents
- Never log sensitive information (passwords, API keys, PHI)
- Data stored in IndexedDB is not encrypted by default
- Consider implementing client-side encryption for sensitive data
- IndexedDB data accessible to JavaScript in the same origin
- Clear IndexedDB when handling real patient data
- Cached data stored in browser storage (memory + IndexedDB)
- Cache may persist sensitive medical information
- Implement cache clearing on logout
- Consider TTL for sensitive data
- WHO ICD-API requires OAuth 2.0 authentication
- Store OAuth tokens securely
- Implement token refresh mechanism
- Never expose API keys in client-side code
- Application handles medical terminology and codes
- Does NOT process actual patient PHI by default
- Users responsible for HIPAA/GDPR compliance
- Implement proper consent management
We follow coordinated vulnerability disclosure:
- Private Disclosure: Report privately to security team
- Assessment: We assess and develop fix
- Coordinated Release: Agree on disclosure timeline with reporter
- Public Disclosure: After fix is available and deployed
Security updates are released as:
- Critical: Immediate patch release
- High: Within 7 days
- Medium: Within 30 days
- Low: Next regular release
DiagnosticoX aims to support compliance with:
- HIPAA (Health Insurance Portability and Accountability Act)
- HITECH (Health Information Technology for Economic and Clinical Health)
- GDPR (General Data Protection Regulation)
- PIPEDA (Personal Information Protection and Electronic Documents Act)
- OWASP Top 10: Address common web application vulnerabilities
- NIST Cybersecurity Framework: Follow NIST guidelines
- SOC 2: Security, availability, processing integrity
- ISO 27001: Information security management
Note: DiagnosticoX provides tools to support compliance but users are responsible for implementing proper controls and procedures for their specific regulatory requirements.
We actively monitor dependencies for security vulnerabilities:
- Automated security scans via GitHub Dependabot
- Regular manual audits
- Prompt updates for security patches
- Alternative packages evaluated when needed
In case of a security incident:
- Containment: Immediately contain the issue
- Assessment: Assess scope and impact
- Notification: Notify affected users
- Remediation: Deploy fix
- Post-Incident: Review and improve processes
For security concerns:
- Email: [security@diagnosticox.com] (preferred)
- GitHub: Create a private security advisory
- Response Time: Within 48 hours
We appreciate responsible disclosure and may publicly acknowledge security researchers who report valid vulnerabilities (with their permission).
Security vulnerabilities that could affect patient safety are treated with highest priority. However, DiagnosticoX is NOT a certified medical device and should not be used for clinical decision-making without proper validation and professional oversight.
Last Updated: 2025-11-06
For general questions not related to security, please use GitHub Issues or Discussions.