We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 0.x.x | ✅ |
We take the security of InventoryMS seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
- Email: [your-email@example.com]
You should receive a response within 48 hours. If for some reason you do not, please follow up via email to ensure we received your original message.
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- We will acknowledge receipt of your vulnerability report
- We will confirm the problem and determine affected versions
- We will audit code to find any similar problems
- We will prepare fixes for all supported releases
- We will release patches and publish a security advisory
When using InventoryMS, we recommend:
- Environment Variables: Never commit
.envfiles or expose API keys - Dependencies: Regularly update dependencies to patch known vulnerabilities
- Authentication: Use strong passwords and enable two-factor authentication where possible
- HTTPS: Always use HTTPS in production environments
- Input Validation: Validate and sanitize all user inputs
- CORS: Configure CORS properly to prevent unauthorized access
- Strong Passwords: Use passwords with at least 12 characters including uppercase, lowercase, numbers, and special characters
- Keep Updated: Always use the latest version of InventoryMS
- Secure Backend: Ensure your backend API is properly secured and uses HTTPS
- Access Control: Implement proper role-based access control
- Regular Backups: Maintain regular backups of your data
This application uses HTTP-only cookies for authentication. Ensure:
- Cookies are set with
Secureflag in production (HTTPS only) SameSiteattribute is properly configured- Backend implements CSRF protection
- All API requests should be made over HTTPS in production
- Implement rate limiting on the backend to prevent abuse
- Use proper authentication tokens with expiration
- Sensitive data should never be stored in localStorage
- All user inputs are validated on both client and server side
- XSS protection is enabled through React's default escaping
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find any similar problems
- Prepare fixes for all supported releases
- Release patches as soon as possible
If you have suggestions on how this process could be improved, please submit a pull request or open an issue.
Last Updated: 2025-10-09