|
| 1 | +# Security Policy |
| 2 | + |
| 3 | +We take the security of `nuxt-users` seriously. We appreciate your efforts to disclose your findings responsibly and will make every effort to acknowledge your contributions. |
| 4 | + |
| 5 | +## Supported Versions |
| 6 | + |
| 7 | +As of now, we only support the latest major version of this project. If you are running an older version, please upgrade before reporting a vulnerability, as it may have already been patched. |
| 8 | + |
| 9 | +| Version | Supported | |
| 10 | +| ------- | ------------------ | |
| 11 | +| 1.x.x | :white_check_mark: | |
| 12 | +| < 1.0.0 | :x: | |
| 13 | + |
| 14 | +## Reporting a Vulnerability |
| 15 | + |
| 16 | +If you have discovered a security vulnerability in this project, please do **not** open a public issue. Publicly disclosing a vulnerability can put the entire community at risk. |
| 17 | + |
| 18 | +Instead, please adhere to the following process: |
| 19 | + |
| 20 | +1. **E-Mail**: Send a detailed description of the vulnerability to [rrd@webmania.cc](mailto:rrd@webmania.cc). |
| 21 | +2. **Subject Line**: Please use the subject line: `SECURITY: Vulnerability in "nuxt-users"`. |
| 22 | +3. **Details**: Include as much information as possible to help us reproduce the issue. This is key. Without reproduction, finding a solution is nearly impossible. This should include: |
| 23 | + * Type of vulnerability (e.g., XSS, SQL Injection, RCE). |
| 24 | + * Step-by-step instructions to reproduce the vulnerability. |
| 25 | + * Proof-of-concept code or screenshots, or videos. |
| 26 | + * Impact of the vulnerability. |
| 27 | + |
| 28 | +### Response Timeline |
| 29 | + |
| 30 | +We are committed to promptly addressing security issues. |
| 31 | + |
| 32 | +* **Acknowledgement**: We will acknowledge receipt of your report within 48 hours. |
| 33 | +* **Assessment**: We will assess the severity and impact of the vulnerability within five business days. |
| 34 | +* **Fix**: We will release a patch or a mitigation as soon as possible, depending on the issue's complexity. |
| 35 | + |
| 36 | +## Security Best Practices for Users |
| 37 | + |
| 38 | +While we strive to keep `nuxt-users` secure, security is a shared responsibility. We recommend the following best practices for users of this project: |
| 39 | + |
| 40 | +* **Keep Dependencies Updated**: Regularly update your Node.js dependencies to ensure you have the latest security patches. |
| 41 | +* **Environment Variables**: Never commit sensitive keys or secrets (like API keys or database credentials) to your version control system. Use `.env` files and ensure they are included in your `.gitignore`. |
| 42 | +* **Input Validation**: Always validate and sanitize user inputs on both the client and server sides to prevent injection attacks. |
| 43 | + |
| 44 | +## Disclaimer |
| 45 | + |
| 46 | +This project is provided "as is" without warranty of any kind, express or implied. The author(s) and contributor(s) shall not be held liable for any damages arising from the use of this software. |
| 47 | + |
| 48 | +--- |
| 49 | + |
| 50 | +♥️ *Thank you for helping keep the community safe.* |
0 commit comments