If you discover a security vulnerability in Bucketwise Planner, please report it responsibly.
Do not open a public GitHub issue. Instead:
-
Email your report to: paulatkins88@gmail.com
-
Include:
- Description of the vulnerability
- Steps to reproduce (if possible)
- Potential impact
- Suggested fix (if you have one)
-
Response timeline:
- We will acknowledge receipt within 48 hours
- We will investigate and work on a fix within 7 days for critical issues
- We will notify you when a fix is released
Currently, only the latest release version receives security patches:
| Version | Status |
|---|---|
| v0.1.0+ | ✅ Supported |
| < v0.1.0 | ❌ No longer supported |
- Never commit secrets to the repository (.env files, API keys, passwords)
- Use strong JWT secrets (minimum 32 characters, random)
- Rotate secrets regularly if deployed in production
- Keep dependencies updated via Dependabot or manual updates
- Enable HTTPS in production (use a reverse proxy like Nginx or Caddy)
- Configure CORS appropriately for your domain
- Input validation: All API inputs validated via Zod schemas
- SQL injection prevention: Use parameterized queries (node-postgres enforces this)
- Password hashing: bcryptjs with 10 rounds (never plaintext)
- JWT secrets: Must be >32 characters, never hardcoded
- Secrets management: Use environment variables, never commit .env files
- Dependency scanning: Monitor for vulnerabilities via npm audit or tools like Snyk
Currently no known security issues. If you find one, please report it as described above.
Thank you for helping keep Bucketwise Planner secure!