| Version | Supported |
|---|---|
| 0.1.x | ✅ |
At ByteHide, we take the security of our projects seriously. If you believe you've found a security vulnerability in DotSecrets, please follow these steps to responsibly disclose it to us:
DO NOT create a public GitHub issue for security vulnerabilities.
Please report security vulnerabilities by emailing us at: support@bytehide.com
When reporting, please include:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any potential solutions you might suggest
You can optionally use our contact form at https://www.bytehide.com/contact.
After you report a vulnerability:
- We will acknowledge receipt of your report within 48 hours
- We will provide an initial assessment of the report within 7 days
- We will work with you to understand and address the issue
- We will keep you informed of our progress throughout the process
- Once the issue is resolved, we will publicly acknowledge your responsible disclosure (unless you prefer to remain anonymous)
When using DotSecrets in your applications, please follow these security best practices:
-
Never commit sensitive files to version control
- Always include
.secretsand.envfiles in your.gitignore - Only commit
.publicfiles with non-sensitive information
- Always include
-
Use environment-specific configurations
- Create separate configuration files for different environments (development, staging, production)
- Apply the principle of least privilege for cloud provider credentials
-
Enable encryption when storing secrets locally
- Use the encryption features of DotSecrets when storing sensitive data
- Securely manage your encryption keys
-
Use dedicated secrets providers in production
- For production environments, prefer dedicated secret management services (AWS Secrets Manager, Azure Key Vault, etc.)
- Avoid storing secrets in environment variables in production where possible
-
Audit access to secrets regularly
- Monitor who has access to your secrets
- Regularly rotate sensitive credentials
- Public disclosure of vulnerabilities will only occur after a fix has been developed and applied
- We request a reasonable amount of time to address reported vulnerabilities before any public disclosure
- We will credit you for your discovery (unless you prefer to remain anonymous)
Thank you for helping keep DotSecrets and its users safe!