I take the security of Fastlytics seriously. If you believe you've found a security vulnerability, please follow these steps:
- Do Not disclose the vulnerability publicly on GitHub Issues or any public forum
- Email me at contact@fastlytics.app with details about the vulnerability
- Include the following information in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- You will receive an acknowledgment of your report within 48 hours
- I aim to validate and assess the severity of each report within 7 days
- I will work on a fix based on severity:
- Critical: 24-48 hours
- High: 1 week
- Medium: 2 weeks
- Low: Next release cycle
- A timely response to your report
- Regular updates on our progress addressing the issue
- Credit for discovering the vulnerability (unless you request anonymity)
- Notification when the vulnerability is fixed
- API Keys: Never commit API keys or other secrets to GitHub
- Authentication: Use Supabase authentication as documented
- Data Handling: Sanitize all user inputs, especially when processing custom race/driver data
- Dependencies: Keep dependencies updated and regularly run security audits
- Strong Passwords: Use strong, unique passwords for your Fastlytics account
Fastlytics employs several security measures:
- API Key Authentication: Backend API endpoints are protected by API keys
- Authentication: User authentication through Supabase
- Sanitized Inputs: All user inputs are sanitized before processing
- Secure Data Storage: Sensitive data is stored securely in Supabase/Cloudflare R2