| Version | Supported |
|---|---|
| 0.1.x | ✅ Yes |
Please do not report security vulnerabilities through public GitHub Issues.
Instead, open a GitHub Security Advisory so the report remains private until a fix is ready.
Include as much of the following as possible:
- Type of issue (e.g. SQL injection, XSS, authentication bypass)
- File paths and line numbers relevant to the issue
- Step-by-step instructions to reproduce
- Proof-of-concept or exploit code (if possible)
- Impact assessment
We will acknowledge receipt within 48 hours and aim to release a fix within 14 days for critical issues.
When self-hosting Flow-IO:
- Rotate all secrets before going to production — never reuse example values
- The
SUPABASE_SERVICE_ROLE_KEYbypasses Row Level Security — keep it server-side only, never expose it to the browser SIPGATE_WEBHOOK_SECRETshould be a randomly generated string (e.g.openssl rand -hex 32)- Enable RLS on all Supabase tables — Flow-IO's migrations do this, but verify after any manual schema changes
- Keep your Supabase instance and Next.js dependencies updated