BerichHub is committed to maintaining the highest security standards for our platform. This document outlines our security policies, vulnerability reporting procedures, and security best practices.
Last Audit Date: July 2, 2025
- β Dependencies: 0 vulnerabilities found across 662 dependencies
- β Outdated Packages: All critical packages are up-to-date
- β Code Security: No hardcoded secrets or credentials detected
- β SQL Injection: Protected by Prisma ORM with type-safe queries
- β XSS Protection: React's built-in XSS protection, minimal controlled HTML usage
- Identity Provider: Kinde Auth for secure authentication
- Session Management: JWT-based session handling
- Route Protection: Middleware-based authentication for protected routes
- User Isolation: Proper user data separation in database queries
- Database Security: PostgreSQL with Prisma ORM
- Type Safety: Full TypeScript implementation
- Input Validation: Zod schema validation for forms and API endpoints
- Data Encryption: Environment variables for sensitive configuration
- Framework: Next.js 15.3.3 with latest security patches
- Dependency Management: Regular dependency updates and security audits
- Environment Isolation: Proper separation of development/production environments
| Version | Supported |
|---|---|
| 5.3.x | β Yes |
| 5.2.x | β Yes |
| 5.1.x | β No |
| < 5.0 | β No |
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
- DO NOT open a public GitHub issue for security vulnerabilities
- DO NOT discuss the vulnerability in public forums or social media
Preferred Method: Security Advisory
- Go to our GitHub Security Advisories
- Click "Report a vulnerability"
- Fill out the form with detailed information
Alternative Method: Email
- Send details by: creating issue
- Use PGP encryption if possible (key available on request)
Please include the following information in your report:
- Vulnerability Type: (e.g., XSS, SQL Injection, CSRF, etc.)
- Location: Specific file, function, or endpoint affected
- Steps to Reproduce: Detailed steps to reproduce the vulnerability
- Impact Assessment: Potential impact and severity
- Proof of Concept: Screenshots, code snippets, or test cases
- Suggested Fix: If you have ideas for remediation
- Initial Response: Within 24 hours
- Vulnerability Assessment: Within 3 business days
- Security Patch: Within 7 days for critical issues, 14 days for others
- Public Disclosure: Coordinated disclosure after patch is available
-
Environment Variables
# Required environment variables (example) DATABASE_URL=your_database_url KINDE_CLIENT_ID=your_kinde_client_id KINDE_CLIENT_SECRET=your_kinde_client_secret KINDE_ISSUER_URL=your_kinde_issuer_url KINDE_SITE_URL=your_site_url KINDE_POST_LOGOUT_REDIRECT_URL=your_logout_url KINDE_POST_LOGIN_REDIRECT_URL=your_login_redirect_url -
Code Security Guidelines
- Never commit secrets or API keys to the repository
- Use environment variables for all sensitive configuration
- Validate all user inputs using Zod schemas
- Use Prisma's type-safe queries instead of raw SQL
- Implement proper error handling without exposing sensitive information
-
Database Security
- Use connection pooling for production environments
- Implement proper database backups with encryption
- Use least-privilege principle for database users
- Regular database security updates
-
Security Headers
// Recommended next.config.ts security headers const nextConfig = { async headers() { return [ { source: "/(.*)", headers: [ { key: "X-Frame-Options", value: "DENY", }, { key: "X-Content-Type-Options", value: "nosniff", }, { key: "Referrer-Policy", value: "strict-origin-when-cross-origin", }, { key: "X-XSS-Protection", value: "1; mode=block", }, ], }, ]; }, };
-
Environment Security
- Use HTTPS in production
- Implement proper CORS policies
- Regular security updates for all dependencies
- Monitor application logs for suspicious activities
- Weekly: Dependency vulnerability scans using
npm audit - Monthly: Security header configuration review
- Quarterly: Complete security audit and penetration testing
- As Needed: Emergency security patches for critical vulnerabilities
We monitor for:
- Unusual authentication patterns
- Failed login attempts
- Suspicious API usage
- Dependency vulnerabilities
- Security advisories for used technologies
- Static Analysis: ESLint with security plugins
- Dependency Scanning: npm audit, audit-ci
- Code Quality: TypeScript strict mode
- Authentication: Kinde Auth with OIDC/OAuth2
- Security Team: security@berichhub.com
- General Support: support@berichhub.com
- Emergency Contact: Available 24/7 for critical security issues
- β Complete dependency audit - 0 vulnerabilities
- β Updated to Next.js 15.3.3
- β Enhanced middleware security
- β Prisma schema security review
- β Implemented Kinde Auth integration
- β Added proper route protection
- β Enhanced input validation with Zod
Last Updated: July 2, 2025
Next Review: October 2, 2025
For questions about this security policy, please contact our security team at security@berichhub.com.