If you discover a security vulnerability in STMS Student App, please email us at security@sliet.edu instead of using the issue tracker.
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes
- Initial Response: Within 24 hours
- Update: Weekly until resolution
- Resolution: ASAP, typically within 1-2 weeks
- Keep the app updated - Always use the latest version
- Use strong passwords - Choose complex passwords
- Enable two-factor authentication - When available
- Don't share credentials - Keep your login information private
- Report suspicious activity - Contact support immediately
- Validate all inputs - Never trust user input
- Sanitize data - Prevent injection attacks
- Use HTTPS only - Always encrypt data in transit
- Secure storage - Use platform-specific secure storage for sensitive data
- Keep dependencies updated - Regular security audits
- Code review - All changes reviewed before merging
- Minimize permissions - Request only necessary permissions
- ✅ Token-based authentication
- ✅ @sliet.edu domain validation
- ✅ OTP verification
- ✅ Secure token storage
- ✅ HTTPS enforcement
- ✅ Encrypted local storage
- ✅ Session management
- ✅ Input validation
- ✅ Request signing
- ✅ Rate limiting
- ✅ CORS configuration
- ✅ API versioning
Currently, no known security vulnerabilities.
We track security advisories for all dependencies. See our Security Audit Workflow for details.
We do not currently have a formal bug bounty program, but we greatly appreciate security researchers who responsibly disclose vulnerabilities.
Last Updated: 2024-02-20