We actively support the following versions:
| Version | Supported |
|---|---|
| 1.x | ✅ |
We take security seriously. If you discover a security vulnerability, please:
- DO NOT open a public issue
- Email us at [INSERT EMAIL] with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and provide a timeline for a fix.
When using this template:
- Keep dependencies updated: Regularly update Fuse.js, Marked.js, Prism.js, and other dependencies
- Use HTTPS: Ensure all external CDN links use HTTPS
- Sanitize user input: If adding comment systems or user-generated content, sanitize all inputs
- Review configuration: Review and update
config.jsonbefore deployment - Use Content Security Policy: Implement CSP headers if hosting on a server
- Validate configuration: Run
node validate-config.jsbefore deploying - Check for XSS: Ensure all user content is HTML-escaped (already implemented in utils.js)
This is a static blog template that runs entirely in the browser. There is no server-side code, which means:
- ✅ No database vulnerabilities
- ✅ No server-side injection risks
- ✅ No authentication bypass issues
- XSS (Cross-Site Scripting): Mitigated by HTML escaping in
utils.js - CSRF (Cross-Site Request Forgery): Not applicable (no server-side actions)
- Dependency vulnerabilities: Keep dependencies updated
- We will acknowledge receipt of your report within 48 hours
- We will provide a detailed response within 7 days
- We will release a fix within 30 days (for critical issues)
- We will credit you in the release notes (if desired)
Security updates will be released as patch versions (e.g., 1.0.0 → 1.0.1).
For critical security issues, we may release a security advisory.
This template uses the following external dependencies:
- Fuse.js (v7.0.0): Client-side search library
- Marked.js: Markdown parser (if used)
- Prism.js: Syntax highlighting (if used)
All dependencies are loaded from CDN (cdn.jsdelivr.net) with integrity checks recommended.
For non-security bugs or feature requests, please use the GitHub Issues page.