Security is a top priority at DocumentStack. We take the security of our systems and our users' data seriously. This document outlines our security policy and how to report vulnerabilities.
We provide security updates for the following versions:
| Version | Supported |
|---|---|
| 2.x.x | β Yes |
| 1.x.x | |
| < 1.0 | β No |
Recommendation: Always use the latest stable version to receive all security updates.
Please DO NOT report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability, please report it to us privately:
Send details to security@documentstack.com with:
- Description - What is the vulnerability?
- Impact - What can an attacker do?
- Affected versions - Which versions are vulnerable?
- Reproduction steps - How can we reproduce it?
- Proof of concept - Code or detailed steps
- Suggested fix - If you have one (optional)
Subject: [SECURITY] Brief description of the issue
- Type of vulnerability (e.g., XSS, CSRF, injection, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- 24 hours - Initial response acknowledging receipt
- 72 hours - Preliminary assessment and severity classification
- 7 days - Detailed response with remediation plan
- 30 days - Target for patch release (critical issues faster)
The following are in scope for vulnerability reports:
- DocumentStack API - Server-side vulnerabilities
- Client Libraries - @documentstack/* npm packages
- Template Engine - Template injection, XSS, etc.
- Authentication/Authorization - Access control issues
- Data exposure - Sensitive information leaks
- Denial of Service - Resource exhaustion
- Dependency vulnerabilities - In production dependencies
The following are typically not considered security issues:
- Vulnerabilities in outdated/unsupported versions
- Issues requiring physical access to user devices
- Social engineering attacks
- Theoretical vulnerabilities without proof of exploitability
- Vulnerabilities in third-party services we don't control
- Issues already reported or being addressed
- Spam or social engineering
- Denial of Service without clear exploitation path
We appreciate security researchers who help keep DocumentStack secure:
Security researchers who responsibly disclose vulnerabilities will be:
- Acknowledged in our security advisories (with permission)
- Listed in our Hall of Fame (coming soon)
- Credited in release notes
We are currently evaluating a bug bounty program. Stay tuned for updates!
When using DocumentStack:
- Keep Updated - Always use the latest stable version
- Secure API Keys - Never expose keys in client-side code or public repos
- Environment Variables - Store credentials in env vars, not in code
- HTTPS Only - Always use HTTPS in production
- Input Validation - Validate and sanitize all user input before templating
- Template Safety - Be cautious with user-provided template data
- Access Control - Implement proper authentication and authorization
- Rate Limiting - Protect your endpoints from abuse
- Monitoring - Monitor for unusual API usage patterns
When contributing code:
- Input Validation - Validate all input
- Output Encoding - Properly encode output
- SQL Injection - Use parameterized queries
- XSS Prevention - Sanitize user content
- CSRF Protection - Implement CSRF tokens
- Dependency Audit - Run
npm auditregularly - Secrets - Never commit secrets or API keys
- Secure Defaults - Default to secure configurations
- Error Handling - Don't leak sensitive info in errors
- Code Review - All code goes through security review
- Regular Audits - Periodic security audits of our codebase
- Dependency Scanning - Automated dependency vulnerability scanning
- Static Analysis - Code is analyzed for security issues
- Penetration Testing - Regular third-party security testing
- Secure Development - Security-focused development practices
- Encryption - Data encrypted in transit and at rest
- Access Control - Principle of least privilege
- Monitoring - 24/7 security monitoring
- Incident Response - Documented incident response procedures
- OWASP Top 10 - https://owasp.org/www-project-top-ten/
- CWE/SANS Top 25 - https://cwe.mitre.org/top25/
- NIST Guidelines - https://www.nist.gov/cybersecurity
- Security Issues: security@documentstack.com
- General Security Questions: security@documentstack.com
- PGP Key: Available on request
This security policy may be updated from time to time. Please check back regularly for updates.
Last Updated: January 2026
Thank you for helping keep DocumentStack and our users safe! π‘οΈ