| Version | Supported |
|---|---|
| 1.x | Yes |
We take security seriously. If you discover a security vulnerability in Occolus, please report it responsibly.
- Do not open a public GitHub issue for security vulnerabilities
- Email your findings to [email protected]
- Include detailed steps to reproduce the vulnerability
- Provide any relevant proof-of-concept code
- Acknowledgment within 48 hours
- Status update within 7 days
- We aim to patch critical vulnerabilities within 14 days
The following are in scope:
- Authentication and authorization flaws
- Injection vulnerabilities (SQL, command, etc.)
- Cross-site scripting (XSS)
- Cross-site request forgery (CSRF)
- Insecure data exposure
- Server-side request forgery (SSRF)
The following are out of scope:
- Denial of service attacks
- Social engineering
- Physical security
- Third-party dependencies (report to upstream)
We will not pursue legal action against researchers who:
- Act in good faith
- Avoid privacy violations
- Do not destroy data
- Report findings promptly
When deploying Occolus:
API Keys
- Store API keys in environment variables
- Never commit
.envfiles to version control - Rotate keys periodically
Network
- Use HTTPS in production
- Configure CORS appropriately
- Place behind a reverse proxy
Dependencies
- Keep dependencies updated
- Run
pip auditandnpm auditregularly - Monitor for CVE announcements