The Zopio team takes security seriously. We appreciate your efforts to responsibly disclose your findings and will make every effort to acknowledge your contributions.
DO NOT open a public issue for security vulnerabilities. Instead, please report them privately through one of these channels:
-
GitHub Security Advisories (Preferred):
- Go to our Security Advisories
- Click "Report a vulnerability"
- Fill out the form with details
-
Email:
- Send details to: security@zopio.com
- For sensitive information, please encrypt your message using our PGP key
- Download our PGP key (.asc)
Please provide as much information as possible:
- Description: Clear explanation of the vulnerability
- Impact: Potential impact or CVSS score (if known)
- Steps to Reproduce: Detailed steps for reproduction
- Affected Versions: List of affected Zopio versions
- Proof of Concept: Code samples, screenshots, or logs if available
- Suggested Fix: If you have ideas for remediation
Timeline Stage | Target Time |
---|---|
Report Acknowledgment | Within 48 hours |
Initial Response | Within 2 business days |
Fix Deployment | Within 7 days for critical issues |
Public Disclosure | After fix or within 90 days of report |
- Acknowledgment: We'll confirm receipt of your report
- Ongoing Communication: Regular status updates
- Timely Fix: Critical issues within 7 days where possible
- Recognition: Your contribution listed in our acknowledgments (unless you prefer anonymity)
- Rewards: While we don't have a formal bounty program, discretionary rewards may be offered for high-impact findings
- Code Reviews: All code changes require peer review before merging
- Automated Scanning: CodeQL and secret scanning tools in CI/CD pipelines
- Dependency Management: Automated updates via Dependabot
- Secret Scanning: Prevents accidental leaks of credentials
- Security Headers: Applied across all applications
- Input Validation: Comprehensive input sanitization
- Authentication: Secure authentication using Clerk
- Rate Limiting: Abuse prevention using Arcjet (Arcjet docs)
Version | Supported |
---|---|
1.x.x | β Supported |
< 1.0.0 | β Not Supported |
When contributing to Zopio, please:
- Never commit secrets: API keys, passwords, tokens, etc.
- Validate inputs: Sanitize all user inputs
- Use parameterized queries: Prevent SQL injection
- Implement authentication and authorization checks
- Handle errors securely: Avoid sensitive info leakage
- Keep dependencies updated
- Follow OWASP Top 10 guidelines
- Check for exposed ports or unintended endpoints
- Review for logging sensitive data
Before submitting your PR:
- No hardcoded secrets or credentials
- All user inputs are validated and sanitized
- Proper authentication and authorization implemented
- Error messages do not expose sensitive information
- Dependencies are up-to-date
- Security headers configured where applicable
- Rate limiting is implemented if needed
- No unintended debug logs or sensitive logs included
- No open ports or unintended endpoints
- We request 90 days to address and fix issues before public disclosure
- We will work with you to clarify and resolve the issue
- You will be credited (if desired)
- We fully support responsible disclosure and will not pursue legal action for good faith reports
We thank the following security researchers for their contributions:
Thank you for helping keep Zopio and its users safe! π‘οΈ