We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 1.x.x | β |
| < 1.0 | β |
We take the security of Valley Catholic Basketball Stats seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- β Open a public GitHub issue
- β Post about it on social media or public forums
- β Attempt to exploit the vulnerability
- β Email us at: [your-security-email@example.com]
- β Provide detailed information about the vulnerability
- β Give us time to fix it before public disclosure
Please provide the following information:
- Type of vulnerability (e.g., XSS, SQL Injection, authentication bypass)
- Affected component(s) (e.g., specific API endpoint, page, feature)
- Steps to reproduce the vulnerability
- Proof of concept (if possible, but not required)
- Potential impact of the vulnerability
- Suggested fix (if you have one)
Subject: [SECURITY] SQL Injection vulnerability in /api/players endpoint
Description:
The /api/players/<name> endpoint is vulnerable to SQL injection through
the player name parameter.
Steps to Reproduce:
1. Navigate to /api/players/test' OR '1'='1
2. Observe unauthorized data access
Impact:
An attacker could potentially access or modify database records.
Suggested Fix:
Use parameterized queries instead of string concatenation.
- Within 24 hours: We'll acknowledge receipt of your report
- Within 7 days: We'll provide an initial assessment and estimated timeline
- Within 30 days: We'll release a patch (if confirmed as a vulnerability)
We appreciate security researchers who help keep our project safe. With your permission, we'll:
- Credit you in our CHANGELOG and release notes
- Add you to our security hall of fame (if you wish)
- Provide a reference/testimonial for your work (upon request)
When using this application:
- β
Never commit
.envfiles or API keys - β Use environment variables for sensitive data
- β Keep dependencies up to date
- β
Run security scans regularly (
bandit,safety) - β Enable 2FA on your GitHub account
- β Review code changes carefully before merging
- β Use HTTPS in production
- β
Set
FLASK_DEBUG=Falsein production - β Use strong database passwords
- β Enable SSL for database connections
- β Regularly update dependencies
- β Monitor application logs for suspicious activity
- β Implement rate limiting on public APIs
- β Keep your API keys confidential
- β Use strong, unique passwords
- β Be cautious about sharing access
- β Report suspicious behavior immediately
This application requires an OpenAI API key. We:
- β Store it only in environment variables
- β Never log it or expose it in responses
- β
Include it in
.gitignorevia.env
- β Use SQLAlchemy ORM to prevent SQL injection
- β Parameterize all queries
- β Validate and sanitize all inputs
- β Content Security Policy headers
- β HTTPS enforced in production
- β XSS protection via template escaping
For security concerns: [your-security-email@example.com]
For general questions: [your-email@example.com]
Thank you for helping keep Valley Catholic Basketball Stats secure! ππ