Deepgram's security policy can be found on our main website.
This project implements comprehensive supply chain security measures to protect against vulnerabilities in dependencies.
Note: The following sections describe security measures for Node.js projects using pnpm. For other languages, adapt these principles to your package manager (pip, cargo, go mod, etc.).
Node.js Projects Only
pnpm 10.0.0+ is required - this project will not work with npm or yarn.
Security configurations (.npmrc):
ignore-scripts=true- All lifecycle scripts are disabled to prevent malicious code executionenable-pre-post-scripts=false- Pre/post install scripts are blockedminimum-release-age=14400- Packages must be 10+ days old before installation (4-hour minimum in minutes)verify-store-integrity=true- Package integrity hashes are verifiedtrust-policy=strict- Strict trust policies enforcedstrict-peer-dependencies=true- Strict peer dependency resolution
Note: This principle applies to all languages, not just Node.js.
All dependencies are pinned to exact versions (no ^ or ~ ranges) to ensure:
- Reproducible builds across all environments
- No unexpected updates that could introduce vulnerabilities
- Full control over dependency updates
Updates to dependencies should be:
- Tested thoroughly in development
- Scanned for security vulnerabilities
- Reviewed before merging to main
Note: Snyk supports multiple languages (Node.js, Python, Go, Java, Ruby, etc.).
This project uses Snyk for continuous security monitoring:
Local Security Checks:
Node.js projects:
# Run security scan on root project
pnpm run security-check
# Run security scan on frontend
cd frontend && pnpm run security-check
# Scan all projects
pnpm run security-check:allOther languages: Use
snyk testwith appropriate language options (e.g.,snyk test --command=python,snyk test --file=go.mod).
Note: Lockfile names vary by language:
- Node.js (pnpm):
pnpm-lock.yaml- Python:
requirements.txt/poetry.lock/Pipfile.lock- Go:
go.sum- Rust:
Cargo.lock
The lockfile is protected:
- CI uses frozen/locked installation flags to prevent modifications
- Any lockfile changes must be committed explicitly
- Ensures consistency between development and production
Note: This applies to all projects regardless of language.
If you discover a security vulnerability in this project:
- Do NOT open a public GitHub issue
- Email security concerns to: [email protected]
- Include detailed information about the vulnerability
- Allow reasonable time for response before public disclosure
We take security seriously and will respond promptly to legitimate security concerns.