| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability, please email me directly instead of opening a public issue.
DO NOT create a public GitHub issue for security vulnerabilities.
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
I'll respond within 48 hours and work on a fix as soon as possible.
-
Never commit your
.env.localfile- It contains your GitHub token
- Already in
.gitignore
-
Use environment variables
- Store sensitive data in
.env.local - Never hardcode tokens in code
- Store sensitive data in
-
Keep dependencies updated
npm audit npm audit fix
-
No sensitive data in code
- Use
process.envfor secrets - Review commits before pushing
- Use
-
Validate all inputs
- GitHub usernames are sanitized
- API responses are validated
-
Follow TypeScript strict mode
- Type safety prevents many bugs
- Already configured in
tsconfig.json
✅ Server-side API route (token never exposed to client)
✅ Input validation on GitHub usernames
✅ Rate limiting via GitHub API
✅ No user data storage
✅ HTTPS only in production
✅ TypeScript strict mode
✅ Dependencies regularly audited
- GitHub API: Official REST API v3
- Vercel: Hosting platform (when deployed)
Both services have their own security policies and are industry-standard.