We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of Script Manager seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them using one of the following methods:
-
GitHub Security Advisories (Preferred)
- Go to the Security tab of this repository
- Click "Report a vulnerability"
- Fill out the form with details
-
Email
- Send an email to the repository maintainer (contact information available on GitHub profile)
- Include "SECURITY" in the subject line
Please include the following information in your report:
- Type of vulnerability
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability, including how an attacker might exploit it
- You should receive an acknowledgment within 48 hours
- We will investigate and send you a more detailed response within 7 days
- We will work on a fix and coordinate the disclosure timeline with you
- We will credit you for the discovery (unless you prefer to remain anonymous)
When deploying Script Manager in production:
-
Change the SECRET_KEY
# Generate a secure key openssl rand -hex 32Set this as the
SECRET_KEYenvironment variable before deploying. -
Use HTTPS
- Always deploy behind a reverse proxy with SSL/TLS
- Never expose the application over HTTP in production
-
Restrict CORS Origins
- Set
ALLOWED_ORIGINSto only your production domains - Never use
*in production
- Set
-
Secure Database
- Use strong passwords for MySQL/PostgreSQL
- Restrict network access to database
- Enable SSL/TLS for database connections
-
Update Regularly
- Keep dependencies up to date
- Monitor for security advisories
- Apply security patches promptly
- Enable rate limiting at the reverse proxy level
- Use environment variables for all sensitive configuration
- Implement network segmentation
- Enable audit logging
- Regular security assessments
- Backup your database regularly
- Use container security scanning in CI/CD
For more detailed security guidance, see our Production Deployment Guide.
- Tokens are valid for 24 hours by default
- Tokens are signed with SECRET_KEY
- No token revocation mechanism is currently implemented
- For sensitive operations, implement additional authentication checks
- Attachments are stored on the server filesystem
- File type validation is based on extension
- Consider implementing antivirus scanning for production deployments
- Set appropriate file size limits
- SQLite is used by default (single-file, no network exposure)
- For production, consider PostgreSQL with proper access controls
- Database credentials are stored in environment variables
- Scheduled jobs execute shell commands
- Jobs run with the permissions of the backend process
- Implement proper access controls and auditing
- Consider running jobs in isolated containers
We will announce security updates through:
- GitHub Security Advisories
- Release notes
- This SECURITY.md file
Script Manager is designed to be deployed in various environments. Depending on your use case, you may need to implement additional controls for:
- GDPR (General Data Protection Regulation)
- HIPAA (Health Insurance Portability and Accountability Act)
- SOC 2 (Service Organization Control 2)
- PCI DSS (Payment Card Industry Data Security Standard)
Please review our Production Deployment Guide for guidance on security controls.
When we receive a security vulnerability report:
- We will confirm receipt within 48 hours
- We will assess the severity and impact
- We will develop and test a fix
- We will prepare a security advisory
- We will coordinate disclosure with the reporter
- We will release the fix and advisory simultaneously
- We will credit the reporter (unless anonymous)
We thank the security researchers who have responsibly disclosed vulnerabilities to us.
Last Updated: April 2026