This is a personal, self-hosted project. Only the latest commit on main is actively maintained.
| Version | Supported |
|---|---|
Latest (main) |
Yes |
| Older commits | No |
If you discover a security vulnerability in this project — especially one that could expose personal health data, credentials, or private logs — please do not open a public GitHub Issue.
Instead, report it privately:
- Go to the repository's Security tab on GitHub
- Click "Report a vulnerability" (GitHub's private advisory feature)
- Describe the vulnerability, steps to reproduce, and potential impact
Alternatively, you can contact the maintainer directly via their GitHub profile.
I will acknowledge the report within 72 hours and aim to release a fix within 14 days for confirmed vulnerabilities.
- A clear description of the vulnerability
- The affected file(s) or endpoint(s)
- Steps to reproduce the issue
- Your assessment of the potential impact
- Any suggested remediation (optional but appreciated)
The following are in scope for security reports:
- Authentication bypass or privilege escalation
- Firestore security rule weaknesses allowing cross-user data access
- API endpoints that leak user data without proper authorisation
- Secrets or credentials unintentionally exposed in source code or build artifacts
- Telegram webhook endpoints that can be spoofed or abused
The following are out of scope:
- Vulnerabilities in third-party dependencies (report directly to those projects)
- Issues that only affect a user's own self-hosted deployment
- Theoretical attacks with no practical exploitation path
Security researchers who responsibly disclose valid vulnerabilities will be credited in the repository's release notes (unless they prefer to remain anonymous).