We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability within Laravel Source Obfuscator, please send an email to Alexandru Florea at alexandru@aflorea.dev. All security vulnerabilities will be promptly addressed.
When reporting a vulnerability, please include:
- Description - A clear description of the vulnerability
- Steps to Reproduce - Detailed steps to reproduce the issue
- Impact - What an attacker could achieve
- Affected Versions - Which versions are affected
- Possible Solution - If you have suggestions for fixing the issue
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity (critical issues within 7-14 days)
When using this package:
- Store PHPBolt license keys securely
- Never commit license keys to version control
- Use environment variables for sensitive configuration
- Keep unobfuscated source code in secure repositories
- Implement proper access control
- Use separate repositories for obfuscated deployments
- Ensure backup directories are not web-accessible
- Implement proper file permissions (755 for directories, 644 for files)
- Regularly clean old backups
- Consider encrypting sensitive backups
- Never serve obfuscated output directory directly
- Use proper deployment processes
- Implement .htaccess or nginx rules to prevent direct access
- Use secure environment variables for credentials
- Implement proper artifact handling
- Restrict access to obfuscation commands
- Use secure artifact storage
# Recommended permissions
chmod 755 build/
chmod 755 backups/
chmod 644 config/obfuscator.php# Use strong, unique values
PHPBOLT_PATH=/secure/path/to/phpbolt.so
PHPBOLT_BINARY=/usr/local/bin/phpbolt
# Restrict output paths
OBFUSCATOR_OUTPUT_DIR=production/obfuscated- Only deploy obfuscated code to production
- Verify obfuscation before deployment
- Implement integrity checks
- Monitor for unauthorized access
- Restrict who can run obfuscation commands
- Implement role-based access control
- Audit obfuscation activities
- Use separate deployment accounts
- Keep the package updated
- Monitor security advisories
- Update PHPBolt regularly
- Apply security patches promptly
This package depends on PHPBolt, a commercial obfuscation tool:
- Ensure PHPBolt is obtained from official sources
- Keep PHPBolt updated
- Follow PHPBolt security guidelines
- Validate PHPBolt integrity
During obfuscation:
- Temporary files may contain unobfuscated code
- Ensure temporary directories are secure
- Clean up temporary files after processing
- Monitor for unauthorized access
Automatic backups contain unobfuscated source code:
- Implement secure backup storage
- Use encryption for sensitive backups
- Regularly audit backup access
- Implement retention policies
We follow coordinated vulnerability disclosure:
- Report - Privately report security issues
- Acknowledge - We acknowledge receipt within 48 hours
- Investigate - We investigate and develop a fix
- Release - We release a security update
- Disclose - We publicly disclose after users have had time to update
- Critical: 14 days after fix release
- High: 30 days after fix release
- Medium: 60 days after fix release
- Low: 90 days after fix release
We recognize security researchers who help make this package more secure:
For security concerns, contact:
- Email: alexandru@aflorea.dev
- GitHub: https://github.com/aflorea4
For general issues, use GitHub Issues.
Note: This security policy is subject to change. Please check regularly for updates.
Last Updated: 2026-01-05