We release patches for security vulnerabilities for the following versions:
Version | Supported |
---|---|
1.x.x | ✅ |
We take the security of OffersPlus seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please send vulnerability reports to:
- Email: [email protected]
- Subject Line: [Security Vulnerability] - Brief description
Please include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Suggested fix (if any)
- Your contact information for follow-up questions
We aim to respond to security reports within 24 hours. After the initial reply, we will keep you informed about the progress towards a fix and full announcement.
- Initial Response (within 24 hours)
- Confirmation & Investigation (1-3 days)
- Fix Development & Testing (timeline varies based on complexity)
- Security Advisory Release
- Patch Release
- Please do not disclose the vulnerability publicly until we have had a chance to address it
- We will credit researchers who report valid security issues (unless they wish to remain anonymous)
- We aim to release patches within 90 days of receiving a report
-
Code Review
- All code changes must go through peer review
- Security-sensitive changes require additional review
-
Dependencies
- Keep dependencies up to date
- Regularly run security audits on dependencies
- Use only trusted and well-maintained packages
-
Authentication & Authorization
- Always use HTTPS
- Implement proper session management
- Follow the principle of least privilege
-
Data Protection
- Never commit sensitive data (API keys, credentials)
- Use environment variables for configuration
- Encrypt sensitive data at rest
-
Account Security
- Use strong, unique passwords
- Enable two-factor authentication when available
- Keep your access tokens secure
-
API Usage
- Protect your API keys
- Use separate API keys for development and production
- Rotate keys periodically
- JWT-based authentication
- HTTPS enforcement
- CORS protection
- Rate limiting
- Input validation
- XSS protection
- CSRF protection
- SQL injection prevention
- Secure password hashing
We strive to comply with industry security standards and best practices:
- OWASP Security Guidelines
- GDPR compliance for EU users
- Regular security audits
- Secure development lifecycle
For any security-related questions, please contact:
- Email: [email protected]
- Website: https://offerplus.io/security
Last updated: January 2025