The React Starter Kit team takes security seriously. We appreciate responsible disclosure of vulnerabilities and are committed to working with security researchers to keep our project secure.
This document outlines our security policy, incident response procedures, and how to report vulnerabilities.
This security policy applies to vulnerabilities discovered within the react-starter-kit
repository itself. The scope includes:
- Core application code and configurations
- Build processes and deployment scripts
- Authentication and authorization implementations
- API endpoints and tRPC procedures
- Database schemas and migrations
- Infrastructure configurations (Terraform, Cloudflare Workers)
- Default security configurations provided by the starter kit
The following are considered out of scope for this policy:
- Vulnerabilities in applications built using the starter kit, unless the vulnerability is directly caused by a flaw in the starter kit's code
- Vulnerabilities in third-party dependencies that have already been publicly disclosed (please use
bun audit
or await Dependabot alerts) - Security issues resulting from user misconfiguration or failure to follow documented security best practices
- Issues that require physical access to the user's device or compromised development environment
- Vulnerabilities requiring a compromised CI/CD pipeline or build environment
- Social engineering attacks against project maintainers or users
We provide security updates for the most recent version of React Starter Kit available on the main
branch. We strongly encourage all users to use the latest stable version of the project to benefit from the latest security patches and improvements.
Version | Supported |
---|---|
main | ✅ |
< main | ❌ |
- Report Security Issues:
[email protected]
- Initial Response: Within 2 business days
- Critical Issues: Escalated immediately to maintainers
Report to: [email protected]
- Description: Clear explanation of the vulnerability and impact
- Steps to Reproduce: Minimal steps to demonstrate the issue
- Proof of Concept: Code or screenshots if applicable
- Affected Version: Branch or commit hash
- Suggested Fix: Optional recommendations
We classify security incidents based on their potential impact:
- Critical (P0): Remote code execution, authentication bypass, data breach affecting all users
- High (P1): Privilege escalation, significant data exposure, XSS in authentication flows
- Medium (P2): Limited data exposure, XSS in non-critical areas, CSRF vulnerabilities
- Low (P3): Information disclosure, minor security misconfigurations
Severity | Initial Response | Fix Target | Disclosure |
---|---|---|---|
Critical | 2 days | 14 days | Upon patch |
High | 3 days | 30 days | Upon patch |
Medium | 5 days | 60 days | Upon patch |
Low | 7 days | Best effort | With release |
- Acknowledge - We confirm receipt within 2 business days
- Validate - We reproduce and assess the issue
- Fix - We develop and test a patch
- Release - We publish the fix and security advisory
- Credit - We acknowledge your contribution (unless you prefer anonymity)
- We communicate via email and keep you informed of progress
- We explain our decisions if we determine something isn't a vulnerability
- Please keep issues confidential until patched
We consider security research conducted in good faith and in accordance with this policy to be:
- Authorized concerning any applicable anti-hacking laws and regulations
- Exempt from restrictions in our Terms of Service that would interfere with security research
- Lawful, helpful, and appreciated
We will not pursue or support legal action against researchers who:
- Make a good faith effort to follow this security policy
- Discover and report vulnerabilities responsibly
- Avoid privacy violations, destruction of data, or interruption of our services
- Do not exploit vulnerabilities beyond what is necessary to demonstrate them
If legal action is initiated by a third party against you for your security research, we will make it known that your actions were conducted in compliance with this policy.
We greatly value the contributions of security researchers. With your permission, we will:
- Publicly credit you in our security advisories
- Add your name to our security acknowledgments
- Provide a letter of appreciation upon request
# Check for vulnerabilities
bun audit
# Enable GitHub security features
# Settings > Security > Code security and analysis
# ✓ Dependabot alerts
# ✓ Secret scanning
- Never commit secrets - Use
.env.local
(gitignored) for local development - Production secrets - Store in Cloudflare Workers secrets or GitHub Actions secrets
- Client code - Only expose
PUBLIC_*
prefixed variables to browser
bun audit # Check dependencies
bun test:security # Run security tests (if configured)
bun update --latest # Update dependencies
- GitHub Security Advisories
- OWASP Top 10
- Cloudflare Workers Security Best Practices
- React Security Best Practices
Thank you for helping us keep React Starter Kit and its community safe!