We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Do not open a public GitHub issue for security vulnerabilities.
Instead, please email us at: aaron@affords.art
Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment - We will acknowledge your report within 48 hours
- Assessment - We will investigate and assess the severity within 7 days
- Updates - We will keep you informed of our progress
- Resolution - We aim to resolve critical issues within 30 days
- Credit - With your permission, we will credit you in our security acknowledgments
This security policy applies to:
- The main Dorkroom application (dorkroom.art)
- The @dorkroom/api package
- Any serverless functions in the
/apidirectory - Supabase edge functions
- Third-party services (Supabase, Vercel, etc.) - report directly to those providers
- Social engineering attacks
- Denial of service attacks
- Issues in dependencies - report to the upstream project
Dorkroom uses CalVer versioning (YYYY.MM.DD). Only the latest release is supported with security fixes.
| Version | Supported |
|---|---|
Latest (YYYY.MM.DD) |
✅ |
| Older releases | ❌ |
When contributing code, please follow these security guidelines:
- Never commit secrets, API keys, or credentials
- Use environment variables for sensitive configuration
- Validate all user input with Zod schemas
- Use parameterized queries for any database operations
- Follow the principle of least privilege for API permissions
We appreciate the security research community's efforts in helping keep Dorkroom secure. Researchers who responsibly disclose vulnerabilities will be acknowledged here (with their permission).
Thank you for helping keep Dorkroom and its users safe.