| Version | Supported |
|---|---|
| 0.1.x | ✅ |
We take the security of TREMOR.LIVE seriously. If you discover a security vulnerability, please follow these steps:
Please do not create a public GitHub issue for security vulnerabilities. This helps prevent malicious exploitation before a fix is available.
Send your report to: security@tremor.live
Include the following information:
- Type of vulnerability
- Full paths of affected source files
- Steps to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact assessment
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: 30-90 days depending on severity
We classify vulnerabilities as:
- Critical: Remote code execution, authentication bypass
- High: Data exposure, privilege escalation
- Medium: Cross-site scripting, CSRF
- Low: Information disclosure, denial of service
When contributing to TREMOR.LIVE:
- Never commit
.envfiles - Use
.env.examplefor documentation - Rotate keys if accidentally exposed
- Store all keys in environment variables
- Never hardcode credentials
- Use minimal permission scopes
- Keep dependencies updated
- Review security advisories
- Use
pnpm auditregularly
- Sanitize user inputs
- Validate data from external APIs
- Use HTTPS for all external requests
We support responsible disclosure:
- Reporter submits vulnerability privately
- We acknowledge and investigate
- We develop and test a fix
- We release the fix
- We publicly credit the reporter (if desired)
TREMOR.LIVE implements:
- Environment-based configuration
- No authentication required (read-only public data)
- Rate limiting on API endpoints
- Input validation on all user inputs
- Secure communication with Convex backend
- No storage of personal user data
For security concerns, contact: security@tremor.live
For general issues, use: https://github.com/sculptdotfun/tremor/issues
We thank all security researchers who responsibly disclose vulnerabilities.