We take the security of TheFeed seriously. If you discover a security vulnerability, please report it responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please email: security@thefeed.org (or DM the maintainers directly)
Include:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Resolution: Depends on severity (critical: ASAP, high: 2 weeks, medium: 1 month)
- API Keys: Never commit your
.envfile. Use.env.exampleas a template. - OAuth Credentials: Protect your Google OAuth client secret.
- Database: Use connection pooling and SSL (
sslmode=require) for Supabase.
- No Secrets in Code: Never hardcode API keys, tokens, or passwords.
- Environment Variables: All sensitive data must go through environment variables.
- Input Validation: Always validate and sanitize user input.
- SQL Injection: Use Drizzle ORM's parameterized queries (never raw SQL with user input).
- XSS Prevention: Use React's built-in escaping; avoid
dangerouslySetInnerHTML.
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
- Authentication: Better Auth with secure session management
- OAuth: Server-side token exchange (no client-side secrets)
- Database: Row-Level Security (RLS) on Supabase
- HTTPS: Enforced on Vercel production deployment
- CORS: Configured for trusted origins only
We don't currently have a formal bug bounty program. However, we deeply appreciate security researchers and will:
- Credit you in our security acknowledgments (with permission)
- Consider swag or donations for significant findings