| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability in EdgeBase, please report it responsibly.
Do NOT open a public GitHub issue for security vulnerabilities.
Instead, please email us at security@edgebase.fun with:
- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (optional)
We will acknowledge receipt within 48 hours and aim to provide an initial assessment within 5 business days.
- We follow coordinated disclosure. Please allow us reasonable time to address the issue before public disclosure.
- We will credit reporters in release notes (unless you prefer to remain anonymous).
- Always set
release: truein youredgebase.config.tsfor production deployments. This disables dev-mode conveniences such as debug token exposure and permissive access rules. - Configure a proper email/SMS provider in production. Without one, authentication flows may silently skip sending verification emails or SMS.
- Use strong, unique values for
JWT_SECRETand other secret environment variables. - Enable access rules to restrict database operations to authorized users.
- Review and restrict CORS origins in your configuration before deploying publicly.