| Version | Supported |
|---|---|
| latest | ✅ |
If you discover a security vulnerability in Iridium, please report it responsibly.
- Do not open a public GitHub issue for security vulnerabilities
- Email the maintainer directly or use GitHub's private vulnerability reporting feature
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Acknowledgment within 48 hours
- Status update within 7 days
- Fix timeline depends on severity
This security policy applies to:
- The Iridium codebase in this repository
- Default configurations
This policy does not cover:
- Third-party dependencies (report to their maintainers)
- User-deployed instances with custom modifications
- Social engineering attacks
When deploying Iridium:
- Environment variables: Never commit
.envfiles. Use your platform's secret management. - BETTER_AUTH_SECRET: Use a strong, unique secret (32+ characters)
- DATABASE_URL: Use SSL connections in production
- Dependencies: Run
npm auditregularly and update dependencies - HTTPS: Always use HTTPS in production
- Authentication is handled by BetterAuth with secure session management
- CSRF protection is built into React Router form handling
- Input validation uses Zod on both client and server