Currently, only the latest version of YouTube Transcript Fetcher is supported.
| Version | Supported |
|---|---|
| 0.1.x | ✅ Yes |
If you discover a security vulnerability, please do not open a public issue. Instead, send an email to: nilesh.kumar@usezenith.ai
Please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if known)
- Initial response: Within 48 hours
- Investigation: Within 7 days
- Resolution: As soon as feasible based on severity
- We will acknowledge receipt of your report
- We will investigate the vulnerability
- We will determine severity and impact
- We will develop a fix
- We will coordinate disclosure if needed
- We will release a security update
The following security issues are in scope for this policy:
- Authentication & Authorization: Bypassing access controls
- Injection: SQL injection, command injection, code injection
- Cross-Site Scripting (XSS): Reflected or stored XSS
- Data Exposure: Unauthorized access to transcripts or data
- Denial of Service (DoS): Resource exhaustion attacks
- Configuration: Security misconfigurations
- Cryptography: Weak encryption or hashing
- Proxy Issues: Proxy credential exposure or misuse
The following are out of scope (unless they demonstrate a serious vulnerability):
- Typos or minor UI bugs
- Issues affecting unsupported versions
- Reports without proof-of-concept or reproduction steps
- Theoretical vulnerabilities without practical impact
- Proxy Credentials: Store securely in environment variables, never in code
- Deployment: Use environment variables for all sensitive configuration
- Updates: Keep the application updated to the latest version
- Network: Deploy behind HTTPS/TLS in production
- Database: Use strong database passwords and restrict access
- No Secrets: Never commit API keys, passwords, or credentials
- Dependencies: Keep dependencies updated
- Input Validation: Always validate and sanitize user input
- Error Messages: Don't expose sensitive information in errors
- Dependencies: Review third-party dependencies before adding
The application uses WebShare rotating proxies for bypassing YouTube rate limiting:
- Credentials are loaded from environment variables
- Never stored in code or configuration files
.env.exampleshows required variables without actual values
- SQLite for development (local file)
- PostgreSQL for production (if configured)
- No sensitive user data stored
- Transcripts are cached from public YouTube videos
/api/transcript- Public endpoint for fetching transcripts- Input validation on all endpoints
- Rate limiting via proxy rotation
- No authentication required (transcripts are public data)
Key security-related dependencies:
fastapi- Web framework with built-in security featurespydantic- Input validation and serializationsqlmodel- Database ORM with parameterized queriesyoutube-transcript-api- Transcript fetching
Security updates will be:
- Released as patch version updates (0.1.x → 0.1.y)
- Announced in the release notes
- Tagged with
securitylabel in releases - Deployed to production as soon as possible
To stay informed about security updates:
- Watch this repository on GitHub
- Subscribe to release notifications
- Check the release notes regularly
- Update to the latest version promptly
- Report: Vulnerability reported privately
- Acknowledge: We confirm receipt within 48 hours
- Investigate: We investigate and validate the issue
- Develop: We develop a fix
- Test: We test the fix thoroughly
- Release: We release a security update
- Announce: We announce the vulnerability (if applicable)
For serious vulnerabilities, we follow coordinated disclosure:
- Fix is developed first
- Users are given time to update
- Public disclosure after update is available
- Credit given to reporter (if desired)
For security questions or concerns:
- Email: nilesh.kumar@usezenith.ai
- PGP Key: [Available on request]
- Response Time: Within 48 hours
Please do not use GitHub issues for security reports.
This security policy was last updated: January 13, 2026
We may update this policy from time to time. The latest version will always be available in this file.