Per the terms of the MIT license, Grandstart is offered "as is" and without any guarantee or warranty pertaining to its operation. While every reasonable effort is made by its maintainers to ensure the product remains free of security vulnerabilities, users are ultimately responsible for conducting their own evaluations of each software release.
Administrators are encouraged to adhere to industry best practices concerning the secure operation of software, such as:
- Do not expose your Grandstart installation to the public Internet
- Do not permit multiple users to share an account
- Enforce minimum password complexity requirements for local accounts
- Prohibit access to your database from clients other than the Grandstart application
- Keep your deployment updated to the most recent stable release
If you believe you've uncovered a security vulnerability and wish to report it confidentially, you may do so via email. Please note that any reported vulnerabilities MUST meet all the following conditions:
- Affects the most recent stable release of Grandstart, or a current beta release
- Affects a Grandstart instance installed and configured per the official documentation
- Is reproducible following a prescribed set of instructions
Please note that we DO NOT accept reports generated by automated tooling which merely suggest that a file or file(s) may be vulnerable under certain conditions, as these are most often innocuous.
If you believe that you've found a vulnerability which meets all of these conditions, please submit a draft security advisory on GitHub, or email a brief description of the suspected bug and instructions for reproduction to security@azorian.solutions.
As Grandstart is provided as free open source software, we do not offer any monetary compensation for vulnerability or bug reports, however your contributions are greatly appreciated.