We take security seriously at Codefin. If you discover a security vulnerability, we appreciate your help in disclosing it to us in a responsible manner.
- Do Not open public issues on GitHub for security vulnerabilities
- Email us at ssnofall@proton.me with details about the vulnerability
- Include the following information:
- Description of the vulnerability
- Steps to reproduce (if applicable)
- Potential impact
- Suggested fix (if any)
- Initial Response: Within 48 hours
- Assessment: Within 1 week
- Fix & Disclosure: Timeline depends on severity (see below)
- Critical: Immediate fix required, within 24-48 hours
- High: Fix required within 1 week
- Medium: Fix required within 1 month
- Low: Fix in next scheduled release
We follow responsible disclosure practices:
- We will acknowledge receipt of your vulnerability report within 48 hours
- We will provide an estimated timeline for a fix within 1 week
- We will notify you when the vulnerability is fixed
- We will publicly disclose the vulnerability after a fix is released, giving credit to the reporter (unless requested otherwise)
Codefin implements the following security measures:
- GitHub OAuth via Supabase Auth
- Row Level Security (RLS) policies on all database tables
- Session management with secure httpOnly cookies
- Automatic profile creation with secure defaults
- All data encrypted at rest (Supabase PostgreSQL)
- TLS 1.3 for all connections
- No sensitive data in URLs or logs
- Input validation and sanitization on all forms
- Strict Content Security Policy (CSP) with nonce-based script execution
- XSS protection via DOMPurify
- CSRF protection via SameSite cookies and request validation
- SQL injection prevention via parameterized queries
- Distributed rate limiting with Redis (prevents abuse)
- Security headers (HSTS, X-Frame-Options, etc.)
- DDoS protection via Vercel Edge Network
- Regular dependency updates
- TypeScript for type safety
- Static analysis with ESLint
- No secrets in code (all via environment variables)
- Error message sanitization (no internal details leaked)
We currently do not offer a bug bounty program, but we greatly appreciate security researchers who report vulnerabilities responsibly. We will:
- Acknowledge your contribution
- Add you to our Security Hall of Fame (if desired)
- Prioritize fixing reported vulnerabilities
- Email: ssnofall@proton.me
We thank the following security researchers for their responsible disclosures:
No vulnerabilities have been reported yet.
Last Updated: 2026-02-16