| Version | Supported |
|---|---|
| 2.0.x | ✅ |
| < 2.0 | ❌ |
We take the security of SoulSync AI seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please send an email to your-email@example.com with:
- Type of vulnerability
- Full paths of source file(s) related to the manifestation of the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- You should receive a response within 48 hours acknowledging receipt of your report
- We will investigate and validate the vulnerability
- We will work on a fix and coordinate the disclosure timeline with you
- We will credit you in the security advisory (unless you prefer to remain anonymous)
- Rate Limiting: API endpoints are protected with rate limiting (100 requests per 15 minutes per IP)
- Input Validation: All user inputs are sanitized and validated
- Environment Variables: Sensitive data stored in environment variables, never in code
- Error Handling: Generic error messages to prevent information disclosure
- CORS Configuration: Properly configured CORS policies
- Dependencies: Regular dependency audits and updates
- API Keys: Never commit API keys or sensitive credentials to version control
- Environment Files: Keep
.envfiles private and add them to.gitignore - Updates: Keep dependencies updated with
npm auditandnpm update - HTTPS: Always use HTTPS in production
- Monitoring: Monitor application logs for suspicious activity
- All API keys are stored in environment variables
-
.envfile is not committed to git - CORS is configured for production domain only
- Rate limiting is enabled
- HTTPS is enforced
- Dependencies are up to date (
npm audit) - Error messages don't expose sensitive information
- Input validation is implemented on all endpoints
The current rate limiting implementation uses in-memory storage. For production deployments with multiple servers, consider:
- Redis-based rate limiting
- Distributed rate limiting solutions
- Load balancer level rate limiting
Currently, the application is stateless. If you implement user sessions:
- Use secure session cookies
- Implement CSRF protection
- Use secure session storage
Security updates will be released as needed. Check the CHANGELOG for security-related updates.