| Version | Supported |
|---|---|
| 0.x.x | ✅ |
If you discover a security vulnerability in PlanForge, please report it responsibly:
- Do NOT open a public GitHub issue
- Email the maintainers directly (add your email here)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Never commit API keys to the repository
- Use
.envfor all secrets - The
.envfile is gitignored by default
- All user input is treated as untrusted
- AI prompts use template separation (instructions vs data)
- File uploads should be validated and sanitized
- Prompt injection protections are implemented
- User-provided content is never directly embedded in system prompts
- Rate limiting prevents abuse
- Authentication is not yet implemented (coming soon)
- Project authorization is disabled pending auth implementation
- Use HTTPS in production
- Set
APP_DEBUG=falsein production - Use strong, unique
APP_KEY - Configure proper CORS settings
- Use Redis with authentication for queues in production