| Version | Supported |
|---|---|
| 1.x | ✅ |
We take security seriously. If you discover a security vulnerability in ByteHub, please report it privately.
- Email: Send details to rajsarkarpc@gmail.com
- Subject: Use prefix
[SECURITY] ByteHub: <brief description> - Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Response Time: We aim to respond within 48 hours
- Updates: We'll keep you informed of our progress
- Credit: We'll credit you in our security advisories (unless you prefer anonymity)
- ❌ Do not open public GitHub issues for security vulnerabilities
- ❌ Do not disclose the vulnerability publicly before we've addressed it
- ❌ Do not exploit the vulnerability beyond what's necessary to demonstrate it
The following are in scope for security reports:
- Authentication/authorization bypasses
- SQL injection, XSS, CSRF vulnerabilities
- Signature verification bypasses (GitHub webhooks, Discord interactions)
- Data exposure or leakage
- Denial of service vulnerabilities
- Vulnerabilities in third-party dependencies (report to them directly)
- Social engineering attacks
- Physical security issues
When deploying ByteHub:
- Environment Variables: Never commit
.envfiles - Database: Use SSL connections to your database
- Secrets: Rotate webhook secrets and bot tokens periodically
- Updates: Keep dependencies updated (we use Dependabot)
Thank you for helping keep ByteHub secure! 🔐