We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
Please do not report security vulnerabilities through public GitHub/GitLab issues.
Instead, please report security vulnerabilities to us privately using one of these methods:
Email: security@grimrepo.dev (coming soon)
PGP Key: Available at .well-known/security.txt
Response Time: We aim to acknowledge reports within 48 hours and provide an initial assessment within 7 days.
For immediate security concerns, you can also reach maintainers via:
- GitLab Security Issue (private): https://gitlab.com/extensions-library/monkey-scripts/grimrepo-scripts/-/issues/new?issuable_template=security
- See
.well-known/security.txtfor additional contact methods
Please include as much of the following information as possible:
- Type of vulnerability (e.g., XSS, injection, authentication bypass)
- Affected component(s) (e.g., specific module, function, or endpoint)
- Step-by-step reproduction instructions
- Proof-of-concept or exploit code (if available)
- Impact assessment (what an attacker could achieve)
- Suggested remediation (if you have ideas)
- Your contact information for follow-up questions
When you report a vulnerability, you can expect:
- Acknowledgment within 48 hours
- Regular updates on our investigation and remediation progress
- Credit in our security advisories (if you wish to be named)
- Coordinated disclosure - we will work with you on timing of public disclosure
- No legal action against good-faith security researchers
- Triage (1-2 days): Validate and assess severity
- Fix Development (variable): Develop and test patch
- Advisory Draft (1 day): Prepare security advisory
- Coordinated Disclosure (negotiated): Work with reporter on timing
- Public Release: Patch release + public advisory
- Post-Mortem (optional): Analyze root cause and prevention
We use the following severity levels:
- Remote code execution
- Authentication bypass
- Data breach potential
- Response: Emergency patch within 24-48 hours
- Privilege escalation
- Cross-site scripting (stored)
- SQL injection
- Response: Patch within 7 days
- Cross-site scripting (reflected)
- Information disclosure
- Denial of service (authenticated)
- Response: Patch within 30 days
- Minor information leaks
- Denial of service (unauthenticated, limited impact)
- Response: Patch in next scheduled release
- Keep Updated: Always use the latest version
- Review Permissions: Understand what access the userscript requires
- Audit Sources: Only install from official sources (GitLab, GreasyFork)
- Report Issues: If something seems suspicious, report it
- Input Validation: Validate all external inputs
- Output Encoding: Properly encode outputs to prevent XSS
- No Secrets: Never commit API keys, tokens, or credentials
- Dependency Audits: Run
npm auditbefore submitting PRs - SAST Tools: Use static analysis tools during development
As a userscript, GrimRepo runs in users' browsers with elevated privileges. We take special precautions:
- Content Security Policy: We restrict inline scripts and external resources
- DOM Isolation: We use shadow DOM to prevent interference
- No External Calls: Offline-first architecture minimizes attack surface
- Minimal Permissions: We request only necessary browser permissions
- User-provided configurations are validated and sanitized
- No
eval()orFunction()constructors on user input - Strict TypeScript types prevent injection vulnerabilities
| Date | Auditor | Scope | Findings | Status |
|---|---|---|---|---|
| 2025-01-15 | Internal Review | Full codebase | 0 | Complete |
We follow Coordinated Vulnerability Disclosure:
- Private Reporting: Vulnerabilities reported privately
- Investigation Period: 90-day maximum before public disclosure
- Patch Development: We develop and test fixes
- Coordinated Release: Public disclosure after patch is available
- Credit: Security researchers credited in advisories (opt-in)
We recognize security researchers who help improve GrimRepo:
- No vulnerabilities reported yet
Thank you to all researchers who help keep GrimRepo secure!
- Security.txt: See
.well-known/security.txt(RFC 9116 compliant) - CVE Database: We register CVEs for qualifying vulnerabilities
- Security Advisories: https://gitlab.com/extensions-library/monkey-scripts/grimrepo-scripts/-/security/advisories
For security-related questions (non-vulnerabilities), contact:
- Email: security@grimrepo.dev (coming soon)
- GitLab Issues: https://gitlab.com/extensions-library/monkey-scripts/grimrepo-scripts/-/issues
Last Updated: 2025-01-22 Version: 1.0