Skip to content

Security: DougTrier/trier-os

Security

SECURITY.md

Security Policy

Supported Versions

Security updates are strictly provided for the latest major version of Trier OS.

Version Supported
3.3.0+
< 3.3.0

Reporting a Vulnerability

DO NOT OPEN A PUBLIC ISSUE FOR A SECURITY VULNERABILITY.

Trier OS is an enterprise-grade Industrial Operating System governing physical manufacturing assets. Public disclosure of a zero-day exploit places real-world industrial infrastructure at immediate risk of failure or attack.

If you discover a vulnerability, please adhere strictly to the following protocol:

  1. Open a Private Advisory: Go to https://github.com/DougTrier/trier-os/security/advisories/new and submit a private security advisory. Only you and the reporter can see it.
  2. Details Required: Please provide explicitly detailed steps to reproduce the exploit within the Trier OS Sandbox (npm run dev:full), the specific file path of the vulnerability, and (if applicable) a suggested architectural mitigation.
  3. Response SLA: The Core Engineering Team will acknowledge receipt of your vulnerability report within 48 hours and outline an expected timeline for deploying a patch.

We take the security of manufacturing networks seriously and appreciate your responsible disclosure to keep the industrial sector safe.


Authentication Architecture

Trier OS uses httpOnly cookie-based authentication for browser sessions.

Property Value
Token type Signed JWT
Storage httpOnly cookie — invisible to JavaScript
Cookie flags HttpOnly, SameSite: Lax, Secure (on HTTPS), Path: /
Session check GET /api/auth/me on page load
Logout POST /api/auth/logout — clears cookie server-side
CSRF SameSite: Lax blocks cross-origin POST/PATCH/DELETE; sufficient for private intranet deployment

Why httpOnly cookies? Tokens in localStorage are readable by any JavaScript on the page (XSS, browser extensions, DevTools on shared plant-floor machines). An httpOnly cookie is never exposed to JavaScript — it cannot be read, copied, or exfiltrated by a script.

API integrations (Power BI, http-edge-agent, HA sync agents) are not browser sessions and cannot use cookies. They pass the JWT as a Bearer token in the Authorization header. The auth middleware accepts both paths and falls back gracefully.

There aren’t any published security advisories