We release patches for security vulnerabilities. The following versions are currently being supported with security updates:
| Version | Supported |
|---|---|
| 1.5.x | ✅ |
| 1.3.x | ✅ |
| < 1.3 | ❌ |
We take the security of Worklog Manager seriously. If you have discovered a security vulnerability, we appreciate your help in disclosing it to us in a responsible manner.
- DO NOT open a public issue or pull request
- Email security details to the project maintainers
- Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if any)
- Your contact information
- Acknowledgment: We will acknowledge receipt of your vulnerability report within 48 hours
- Investigation: We will investigate the issue and determine its severity
- Resolution: We will work on a fix and notify you of the timeline
- Disclosure: Once patched, we will publicly disclose the vulnerability with credit to you (if desired)
When using Worklog Manager, follow these security best practices:
- Keep Updated: Always use the latest version of the application
- File Permissions: Ensure proper file permissions on the database and config files
- Backup Data: Regularly backup your worklog data
- Local Storage: Keep the database file in a secure location
- Access Control: Limit access to the application directory on shared systems
If you're contributing to Worklog Manager:
- Input Validation: Always validate and sanitize user input
- SQL Injection: Use parameterized queries (already implemented via SQLAlchemy)
- File Operations: Validate file paths to prevent directory traversal
- Dependencies: Keep dependencies updated and monitor for vulnerabilities
- Sensitive Data: Never commit sensitive data (passwords, keys) to the repository
- Code Review: All code changes should be reviewed before merging
-
SQLite Database: Stored locally without encryption by default
- Consider disk-level encryption for sensitive environments
- Database file is not password-protected
-
Log Files: May contain sensitive information
- Stored in plain text in
logs/directory - Automatically rotated daily
- Consider log retention policies
- Stored in plain text in
-
Backup Files: Contain complete database copies
- Stored unencrypted in
backups/directory - Should be protected at the file system level
- Stored unencrypted in
- config.ini: Contains application settings
- No sensitive credentials by default
- File permissions should restrict access on shared systems
- Exported Reports: May contain sensitive work data
- CSV, JSON, PDF files stored in
exports/directory - Users should manage export file security based on data sensitivity
- CSV, JSON, PDF files stored in
- Input Validation: All user inputs are validated before processing
- SQL Injection Protection: Using parameterized queries via SQLAlchemy ORM
- Path Traversal Protection: File paths are validated and sanitized
- State Validation: Application state transitions are validated to prevent data corruption
- Error Handling: Comprehensive error handling prevents information leakage
- Audit Trail: Complete action logging for accountability
For organizations deploying Worklog Manager in production:
- Implement file-level or disk-level encryption for sensitive data
- Configure backup retention policies appropriate for your environment
- Set restrictive file permissions on application directories
- Monitor log files for suspicious activity
- Implement network isolation if running on shared systems
- Regular updates: Subscribe to release notifications
- Access control: Limit user access to the application directory
When we receive a security bug report, we will:
- Confirm the problem and determine affected versions
- Audit code to find any similar problems
- Prepare fixes for all supported releases
- Release new versions as soon as possible
- Publicly announce the vulnerability after patch is available
For security concerns, please contact the project maintainers through GitHub issues (for non-sensitive matters) or via direct communication for sensitive security issues.
We would like to thank the following individuals for responsibly disclosing security vulnerabilities:
(List will be updated as security reports are received and resolved)
Last Updated: October 21, 2025