| Version | Supported |
|---|---|
| 1.x.x | ✅ |
We take the security of TCRN TMS seriously. If you discover a security vulnerability, please follow these steps:
- Do NOT open a public GitHub issue for security vulnerabilities
- Email us at: security@tcrn-tms.com (or contact @tpmoonchefryan directly)
- Include as much information as possible:
- Type of vulnerability (e.g., XSS, SQL injection, authentication bypass)
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability and provide an initial response within 7 days
- Resolution: We aim to resolve critical vulnerabilities within 30 days
- Disclosure: We will coordinate with you on public disclosure timing
The following are in scope for security reports:
- TCRN TMS main application (web, api, worker)
- PII Service
- Authentication and authorization systems
- Data encryption and privacy features
- Third-party integrations
- Denial of service attacks
- Social engineering
- Physical security
- Issues in dependencies (please report to the respective project)
When deploying TCRN TMS:
- Environment Variables: Never commit
.envfiles to version control - mTLS: Always use mTLS for PII Service communication in production
- Database: Use strong passwords and enable SSL for PostgreSQL connections
- Updates: Keep all dependencies up to date
- Secrets: Rotate JWT secrets and API keys regularly
We thank all security researchers who help keep TCRN TMS secure. Contributors will be acknowledged here (with permission).
This security policy is subject to change. Last updated: January 2026