If you discover a security vulnerability in CertLab, please report it by opening an issue on GitHub or contacting the maintainers directly.
CertLab uses automated security scanning through:
- npm audit - Runs on every dependency change and weekly (see
.github/workflows/dependency-audit.yml) - Dependabot - Configured for weekly updates (see
.github/dependabot.yml)
The following vulnerabilities have been reviewed and documented:
- Advisory: GHSA-67mh-4wv8-2f99
- Affected Package:
esbuild <=0.24.2(specificallyesbuild@0.21.5bundled invite@5.4.x) - Severity: Moderate
- Status: Accepted Risk (Development Only)
- Risk Assessment:
- This vulnerability affects the development server only
- It allows any website to send requests to the dev server and read responses
- Production builds are NOT affected - esbuild is only used during development and build time
- The built static assets (HTML, CSS, JS) do not contain esbuild
- Fixing this vulnerability requires upgrading to vite v7.x which is a breaking change
- Mitigation:
- Run the development server only on trusted networks
- Do not expose the development server to the public internet
- The vulnerability will be automatically resolved when vite v5.x receives a patched esbuild version, or when the project upgrades to vite v7.x
Accessibility features can introduce security considerations:
- ARIA Labels: While ARIA labels help screen readers, avoid including sensitive information in aria-labels that shouldn't be announced
- Status Messages: Use
aria-liveregions appropriately to avoid information leakage
- Tab Order: Ensure logical tab order doesn't expose sensitive form fields prematurely
- Focus Management: Prevent focus from being trapped in a way that could be exploited
- Test accessibility features for potential security implications
- Ensure screen readers don't announce sensitive data inappropriately
- Validate that keyboard navigation doesn't bypass security controls
- Check that high contrast modes don't reveal hidden content
For more on accessibility features, see ACCESSIBILITY.md.
When contributing to CertLab:
- Never commit secrets or credentials to the repository
- Keep dependencies up to date using
npm updateandnpm audit fix - Review Dependabot PRs promptly
- Run
npm auditbefore creating pull requests that modify dependencies - Test accessibility features for security implications
- Ensure ARIA labels don't expose sensitive information