Skip to content

Security: Disane87/scrape-dojo

SECURITY.md

πŸ›‘οΈ Security Policy

πŸ“¦ Supported Versions

Version Supported
latest βœ…

🚨 Reporting a Vulnerability

If you discover a security vulnerability in Scrape Dojo, please report it responsibly.

Do NOT open a public GitHub issue for security vulnerabilities.

Instead, please use one of the following methods:

  1. GitHub Security Advisories (preferred): Report a vulnerability
  2. Email: Contact the maintainer directly via GitHub profile

πŸ“‹ What to include

  • πŸ“ A description of the vulnerability
  • πŸ”„ Steps to reproduce the issue
  • πŸ’₯ Potential impact
  • πŸ’‘ Suggested fix (if any)

⏱️ What to expect

  • πŸ“¬ Acknowledgment within 48 hours
  • πŸ“Š Status update within 7 days
  • πŸ”§ Fix timeline depends on severity:
    • πŸ”΄ Critical: Patch within 48 hours
    • 🟠 High: Patch within 7 days
    • 🟑 Medium/Low: Patch in next release

🎯 Scope

The following are in scope:

  • πŸ” Authentication bypass (JWT, OIDC, API keys)
  • πŸ”‘ Secret/credential exposure
  • πŸ’» Remote code execution
  • πŸ—ƒοΈ SQL injection
  • 🌐 Cross-site scripting (XSS) in the UI
  • πŸ”— Server-side request forgery (SSRF)
  • ⬆️ Privilege escalation

🚫 Out of Scope

  • πŸ“¦ Vulnerabilities in dependencies (please report upstream)
  • 🏒 Issues requiring physical access
  • 🎭 Social engineering attacks
  • 🌊 Denial of service (DoS) attacks

πŸ”’ Security Best Practices for Users

  • πŸ”‘ Always set a strong SCRAPE_DOJO_ENCRYPTION_KEY and SCRAPE_DOJO_AUTH_JWT_SECRET
  • 🌐 Never expose the application to the public internet without authentication enabled
  • 🐳 Keep your Docker images up to date
  • πŸ” Use HTTPS when deploying in production

There aren't any published security advisories