We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
If you discover a security vulnerability within Boardly, please send an email to security@boardly.online. All security vulnerabilities will be promptly addressed.
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
This information will help us triage your report more quickly.
- Initial Response: Within 48 hours of receiving your report
- Status Update: Within 7 days with assessment and planned fix timeline
- Fix Release: Depends on severity
- Critical: Within 24-48 hours
- High: Within 7 days
- Medium: Within 30 days
- Low: Next regular release
- The security report is received and assigned a primary handler
- The problem is confirmed and a list of affected versions is determined
- Code is audited to find any similar problems
- Fixes are prepared for all supported releases
- New versions are released and security advisory is published
We practice coordinated disclosure. Once a fix is available:
- We will publish a security advisory on GitHub
- The vulnerability details will be shared with credit to the reporter (unless anonymity is requested)
- A CVE ID will be requested if applicable
While we work hard to ensure the security of Boardly, you can help protect your deployment:
- Never commit
.envor.env.localfiles - Use strong, random values for
JWT_SECRETandNEXTAUTH_SECRET - Rotate secrets regularly (every 90 days recommended)
- Use different secrets for development and production
- Use SSL/TLS for database connections
- Implement regular database backups
- Use connection pooling with limits
- Never expose database credentials in client-side code
- Enable two-factor authentication for admin accounts
- Implement rate limiting on auth endpoints (already configured)
- Monitor for suspicious login patterns
- Use secure password hashing (bcrypt with salt, already implemented)
- Rate limiting is enabled by default on all API routes
- CSRF protection is enabled via middleware
- Keep dependencies up to date with
npm audit - Validate and sanitize all user inputs
- Always use HTTPS in production (enforced on Vercel)
- Set appropriate CORS origins (configured in
socket-server.ts) - Enable Sentry error tracking for monitoring
- Keep Node.js and npm/yarn versions updated
- User passwords are hashed with bcrypt
- JWT tokens expire and are stored securely
- Personal data follows GDPR principles (minimal collection)
- Regular security audits of dependencies
- Guest users have limited privileges
- Guest data is temporary and not persisted in User table
- Guest IDs are client-generated (consider server-side generation for enhanced security)
- Real-time connections are rate-limited
- Room access is validated server-side
- Socket events are authenticated
- Consider adding connection encryption for sensitive data
We use the following third-party services:
- Supabase (Database) - SOC 2 Type II certified
- Vercel (Frontend hosting) - Enterprise security standards
- Render (Socket.IO server) - Regular security updates
- Resend (Emails) - GDPR compliant
- Sentry (Error tracking) - Data encryption in transit and at rest
For any security-related questions or concerns, contact:
- Email: security@boardly.online
- Response Time: Within 48 hours
We currently do not have a formal bug bounty program. However, we greatly appreciate security researchers who responsibly disclose vulnerabilities and will:
- Acknowledge your contribution in our security advisories
- Provide credit in release notes
- Consider compensation for critical vulnerabilities on a case-by-case basis
Boardly follows these security standards:
- OWASP Top 10 Web Application Security Risks
- CWE/SANS Top 25 Most Dangerous Software Errors
- General Data Protection Regulation (GDPR) principles
Last Updated: November 28, 2025