Skip to content

Security: MakeReadyApp/MakeReady.Mobile

Security

SECURITY.md

Security Policy

Thanks for helping keep MakeReady and its users safe.

Reporting a vulnerability

Please do not open a public GitHub issue for security problems.

Email dev@guccigunclub.com with:

  • A description of the issue
  • Steps to reproduce, or a proof of concept
  • The impact you think it has (what could an attacker do?)
  • Your GitHub handle, if you'd like credit in the fix

Expect an acknowledgement within a few days. This is a volunteer-run community project, so response times are best-effort, not SLA-grade.

Scope

In scope:

  • Authentication bypass or session handling flaws in the Supabase sync path
  • Issues with the master / scoring pad sync server that could let an unauthorized device read or write match data over the local network
  • Broken Row-Level Security (cloud-side data visible across clubs, users, matches)
  • Data leakage from the local SQLite database beyond the app sandbox
  • Sensitive data exposure (PII, auth tokens, unintended publics)
  • Privilege escalation (RO gaining MD capabilities, or similar)

Out of scope:

  • Issues that require physical access to an unlocked tablet the attacker already owns
  • Automated scanner output without a working proof of concept
  • Match-day social engineering against MDs or ROs
  • Rooted-device attacks on data that's protected by OS-level sandboxing

Please do not

  • Attack the production Supabase project (the backend of makereadyapp.com) — spin up your own Supabase project for testing
  • Run automated scans, fuzzers, or exploit tooling against devices you don't own
  • Publicly disclose the issue before we've had a chance to respond

Credits

Researchers who follow this policy and report in good faith will be credited in the fix (unless you prefer anonymity). There's no bug bounty program — this is a volunteer community project — but your work will be visible and appreciated.

There aren’t any published security advisories