| Version | Supported |
|---|---|
| 1.0.x | ✅ |
- Discord OAuth2 with PKCE flow
- Client secret stored in compiled Rust binary
- Tokens stored locally with secure storage
- Guild verification for access control
- No sensitive data transmitted to third parties
- Local storage encryption for tokens
- Session-based cache invalidation
- Automatic token refresh mechanism
- HTTPS-only API communications
- Rate limiting protection
- Request timeout configurations
- Retry mechanisms with exponential backoff
.env- Environment variablesdiscord.config.ts- Discord credentials*.secret- Secret files*.secrets.json- Secret JSON files
.env.example- Template without values- Source code with placeholder values
- Configuration templates
If you discover a security vulnerability:
- Do NOT open a public issue
- Email: [your-security-email]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial response: 48 hours
- Status update: 7 days
- Resolution target: 30 days
- Never commit credentials or secrets
- Use environment variables for sensitive data
- Review code for hardcoded values before PR
- Keep dependencies updated
- Follow secure coding guidelines
We appreciate responsible disclosure and will acknowledge security researchers who help improve Wildflover's security.