This is Srapsware's private business website. The code is public for educational purposes only.
Important: This security policy applies to our live production website (https://www.srapsware.com), not to any copies, forks, or clones you might create.
We actively support the following versions of the Srapsware website:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < 1.0 | ❌ |
Only report vulnerabilities in our live production website at https://www.srapsware.com
- Cloned or copied versions of this code
- Forked repositories
- Modified versions you create
- Your own implementations
If you find a vulnerability in our live website, we take it seriously.
DO NOT open a public issue for security vulnerabilities.
Instead, please report security issues to:
📧 Email: contact@srapsware.com
Please provide the following information:
- Type of vulnerability - XSS, CSRF, SQL injection, etc.
- Location - URL, file path, or component affected
- Steps to reproduce - Detailed steps to reproduce the issue
- Proof of concept - Code or screenshots demonstrating the vulnerability
- Impact - What could an attacker accomplish?
- Suggested fix - If you have ideas for remediation
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Status update: Weekly until resolved
- Fix deployment: Depends on severity
- Critical: Within 24-48 hours
- High: Within 1 week
- Medium: Within 2 weeks
- Low: Next release cycle
- Acknowledgment - We'll confirm receipt of your report
- Investigation - We'll verify and assess the vulnerability
- Communication - We'll keep you updated on progress
- Resolution - We'll deploy a fix and notify you
- Credit - With your permission, we'll credit you in our security advisory
- Never commit secrets - Use environment variables
- Validate input - Always sanitize user input
- Use HTTPS - All production traffic should be encrypted
- Update dependencies - Keep packages up to date
- Follow OWASP - Adhere to OWASP Top 10 guidelines
- Environment Variables - Never commit
.envfiles - API Keys - Keep your API keys secure
- Updates - Keep your deployment updated
- Access Control - Limit admin access appropriately
The following sensitive data should be set via environment variables:
# Email Configuration
SMTP_HOST=
SMTP_PORT=
SMTP_USER=
SMTP_PASSWORD=
# Mailchimp
MAILCHIMP_API_KEY=
MAILCHIMP_AUDIENCE_ID=
MAILCHIMP_API_SERVER=
# GitHub OAuth (for CMS)
GITHUB_OAUTH_CLIENT_ID=
GITHUB_OAUTH_CLIENT_SECRET=- Blog content and portfolio items are stored in Git
- User-uploaded files go through validation
- All form submissions are rate-limited
We use the following third-party services:
- Vercel - Hosting and deployment
- Mailchimp - Newsletter management
- GitHub - CMS authentication
- Google Analytics - (if enabled) Analytics
Our deployment includes standard security headers:
- Content-Security-Policy
- X-Frame-Options
- X-Content-Type-Options
- Referrer-Policy
- Permissions-Policy
We regularly audit dependencies using:
pnpm auditRun this command regularly to check for known vulnerabilities.
- Email: contact@srapsware.com
- Website: https://www.srapsware.com
Thank you for helping keep Srapsware and our users safe! 🔒