The ZapisAxis project currently supports the latest release version with security updates. We recommend always using the most recent version to ensure you have the latest security fixes and improvements.
| Version | Supported |
|---|---|
| Latest | ✅ |
| Older | ❌ |
We take security seriously and appreciate your efforts to responsibly disclose any vulnerabilities you find in ZapisAxis. To report a security issue, please follow these steps:
- Do Not Open a Public Issue: Avoid disclosing the vulnerability publicly (e.g., in a GitHub issue) until it has been addressed.
- Contact Us Privately:
- Email the vulnerability details to [email protected].
- Include a detailed description of the issue, steps to reproduce, potential impact, and any suggested fixes.
- If possible, provide a proof-of-concept or screenshot to aid in understanding the issue.
- Response Time:
- We aim to acknowledge your report within 48 hours.
- We will work with you to validate the issue and determine a fix timeline.
- Disclosure:
- Once the issue is resolved, we will coordinate with you on how to disclose the vulnerability responsibly.
- Credit will be given to the reporter in release notes or documentation, unless you prefer to remain anonymous.
To enhance the security of ZapisAxis, we recommend the following:
- Update Password Storage: The current version stores passwords in plain text in the
userstable. Consider contributing a patch to implement password hashing (e.g., BCrypt or SHA-256). - Secure Database Connections: Ensure MySQL is configured with secure credentials and access controls when deploying ZapisAxis.
- Regular Backups: Use the built-in backup feature (
Settings.cs) to create regular database backups. - Validate Inputs: All user inputs are sanitized in the current version, but additional validation can be added for robustness.
- Keep Dependencies Updated: Regularly update NuGet packages (e.g., MySql.Data, ClosedXML, PdfSharp) to their latest secure versions.
- Plain Text Passwords: Passwords are stored in plain text in the
userstable, which is a security risk. We plan to address this in future releases. - Local Database: The application relies on a local XAMPP MySQL instance, which may not be suitable for production environments without additional security measures.
If you have suggestions for improving security, please submit them via a pull request or issue, following our Contributing Guide.
Thank you for helping keep ZapisAxis secure!