| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability, please report it responsibly:
- Do not open a public issue
- Email the maintainer directly (check repository owner's profile)
- Include a detailed description of the vulnerability
- Provide steps to reproduce if possible
- Type of vulnerability
- Affected component (auth, sync, storage, etc.)
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial response: Within 48 hours
- Status update: Within 7 days
- Resolution target: Within 30 days (depending on severity)
- Never commit
credentials/directory contents - Never commit
config.yamlwith real tokens - Use environment variables in CI/CD
- Set restrictive file permissions:
chmod 600 credentials/*
- Run as non-root user (default in our image)
- Mount config as read-only:
-v ./config.yaml:/app/config.yaml:ro - Use specific image tags, not
latestin production - Regularly update to latest versions
- Todoist Bridge only makes outbound HTTPS connections
- No inbound ports required after initial OAuth setup
- Consider running in isolated network if possible
The Alexa integration uses alexa-remote2, an unofficial library that stores Amazon session cookies. These cookies provide access to your Amazon account's Alexa features. Keep alexa-cookie.json secure.
Google OAuth tokens in google-token.json provide access to your Google Tasks. While scoped to Tasks only, protect these files.
Your Todoist API token provides full access to your Todoist account. Never expose it in logs or public repositories.