We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| latest | ✅ |
We take the security of Taskflow Calendar seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please use GitHub's private vulnerability reporting feature:
- Go to the Security tab of this repository
- Click "Report a vulnerability"
- Fill out the form with the details below
You should receive a response within 48 hours.
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
-
Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours.
-
Communication: We will keep you informed of our progress as we work to understand and address the issue.
-
Resolution: Once the issue is resolved, we will notify you and discuss the appropriate timeline for public disclosure.
-
Credit: We are happy to credit security researchers who report valid issues in our release notes (unless you prefer to remain anonymous).
When contributing to this project, please:
-
Never commit sensitive data: API keys, passwords, tokens, or any other secrets should never be committed to the repository.
-
Use environment variables: All sensitive configuration should be handled through environment variables.
-
Keep dependencies updated: Regularly check for and apply security updates to dependencies.
-
Follow secure coding practices:
- Validate and sanitize all user inputs
- Use parameterized queries for database operations
- Implement proper authentication and authorization
- Use HTTPS for all external communications
-
Review your code: Before submitting a PR, review your changes for potential security implications.
Taskflow Calendar implements the following security measures:
- Authentication: JWT-based authentication with access/refresh token rotation
- Password Security: Passwords are hashed using bcrypt
- Input Validation: All inputs are validated using Zod schemas
- CORS Protection: Configurable CORS policies
- Rate Limiting: API rate limiting to prevent abuse
- SQL Injection Prevention: Parameterized queries for all database operations
We regularly audit our dependencies for known vulnerabilities using:
npm auditIf you notice any vulnerable dependencies, please report them through the same process as other security issues.
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find any similar problems
- Prepare fixes for all supported versions
- Release new versions and update the changelog
- Announce the vulnerability (with appropriate credit to the reporter)
Thank you for helping keep Taskflow Calendar and our users safe!