We take the security of Trust Scan seriously. If you believe you have found a security vulnerability, please report it to us responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please email us at: contact@undeadlist.com
Include the following in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment: We will acknowledge receipt within 48 hours
- Assessment: We will assess the vulnerability and determine severity
- Fix: We will work on a fix and coordinate disclosure
- Credit: We will credit you in our release notes (unless you prefer anonymity)
The following are in scope for security reports:
- The Trust Scan web application
- API endpoints (
/api/scan,/api/analyze,/api/config) - Authentication and authorization mechanisms
- Data handling and storage
- Third-party integrations we control:
- Prisma database operations
- Upstash Redis caching
- Ollama AI integration
The following are NOT in scope:
- Third-party services we query (not our infrastructure):
- WHOIS providers
- Archive.org
- GitHub API
- URLhaus, PhishTank, Spamhaus, AbuseIPDB
- Social engineering attacks
- Physical attacks
- Denial of service attacks
- Issues in dependencies (report these to the respective maintainers)
We currently support the latest version of Trust Scan. We recommend always running the most recent version.
If you're self-hosting Trust Scan:
- Keep dependencies updated: Run
npm auditregularly - Secure your environment variables: Never commit
.envfiles - Use HTTPS: Always serve the application over HTTPS in production
- Limit database access: Restrict PostgreSQL access to necessary users only
- Monitor logs: Watch for unusual scanning activity
- Rate limiting: Ensure Upstash Redis is configured for rate limiting in production
- API keys: Rotate threat intelligence API keys periodically
Trust Scan handles the following data:
- URLs submitted for scanning: Cached for 24 hours, then eligible for cleanup
- Scan results: Stored in PostgreSQL, no personal user data collected
- Threat intelligence cache: Stored in Redis with TTL (1hr clean, 24hr malicious)
We do not:
- Collect personal information
- Track users
- Share scan data with third parties
- Store API keys or credentials from scanned sites
We follow responsible disclosure principles:
- We will not take legal action against researchers who report in good faith
- We will work with researchers to understand and resolve issues
- We will acknowledge researchers in our security advisories
Thank you for helping keep Trust Scan and its users safe!