Alternate Futures is committed to privacy, security, and censorship resistance. We take security vulnerabilities seriously and appreciate the security research community's efforts to responsibly disclose issues.
We currently support the following versions with security updates:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do not report security vulnerabilities through public GitHub issues.
- Go to the Security tab
- Click "Report a vulnerability"
- Provide detailed information about the vulnerability
If you prefer email, send details to: security@alternatefutures.com
Please include:
- Type of vulnerability (e.g., SQL injection, XSS, authentication bypass)
- Full paths of affected source file(s)
- Location of the affected code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact assessment and potential attack scenarios
- Any suggested fixes or mitigations
- Initial Response: Within 48 hours
- Status Update: Within 7 days with validation status
- Fix Timeline: Critical issues within 30 days, others within 90 days
- Public Disclosure: After patch is released and users have time to update (minimum 14 days)
We ask that you:
- Give us reasonable time to fix the vulnerability before public disclosure
- Make a good faith effort to avoid privacy violations, data destruction, or service interruption
- Do not exploit the vulnerability beyond what is necessary to demonstrate the issue
- Do not access, modify, or delete data belonging to others
We maintain a Security Hall of Fame for researchers who responsibly disclose vulnerabilities:
- Recognition in our CHANGELOG and release notes (if desired)
- Public acknowledgment on our website (if desired)
- Swag and credits for significant findings
If you're deploying Alternate Futures infrastructure:
-
Environment Variables: Never commit
.envfiles or expose secrets- Use strong, randomly generated JWT secrets
- Rotate secrets regularly (minimum every 90 days)
- Use different secrets for development, staging, and production
-
Database Security:
- Use strong PostgreSQL passwords (minimum 32 characters)
- Enable SSL/TLS for database connections
- Regularly backup your database with encryption
- Restrict database network access to application servers only
-
API Security:
- Enable rate limiting on all public endpoints
- Use Personal Access Tokens (PATs) with minimal required scopes
- Regularly audit and revoke unused API keys
- Monitor for unusual API usage patterns
-
Infrastructure:
- Keep Docker images updated
- Use non-root users (already configured in our Dockerfile)
- Enable firewall rules to restrict unnecessary network access
- Implement monitoring and alerting for security events
-
SSL/TLS Certificates:
- Our platform auto-provisions Let's Encrypt certificates
- Monitor certificate renewal jobs (runs daily at 2 AM)
- Set up alerts for certificate expiration
Our application implements security headers including:
- Strict-Transport-Security (HSTS)
- X-Content-Type-Options
- X-Frame-Options
- Content-Security-Policy
- Run
npm auditregularly and fix vulnerabilities - Update dependencies weekly (automated via Dependabot)
- Review access logs for suspicious activity
- Test disaster recovery procedures quarterly
-
Authentication & Authorization:
- JWT-based authentication via dedicated auth service
- Personal Access Token (PAT) system with rate limiting
- Service-to-service authentication
- Wallet-based authentication for Web3 users
-
Input Validation:
- GraphQL schema validation
- Route validation with URL sanitization
- XSS prevention
- SQL injection prevention via Prisma ORM
-
Rate Limiting:
- PAT creation limited to 50/day per user
- Maximum 500 active PATs per user
- Redis-based rate limiting
-
Audit Logging:
- All API key operations logged
- Authentication events tracked
- Permission changes recorded
-
Secure Communications:
- Automatic SSL/TLS provisioning
- HTTPS enforcement
- Secure WebSocket connections (WSS)
- Decentralized Storage: Support for IPFS, Arweave, Filecoin
- Self-Hosted Options: Full self-hosting capability
- Web3 Domains: Support for ENS, ArNS, IPNS
- Minimal Data Collection: Only essential data collected
- Wallet-Based Auth: Privacy-preserving authentication option
We maintain transparency about security issues and fixes:
| Date | Severity | Component | Status | CVE |
|---|---|---|---|---|
| - | - | - | - | - |
We use the following security tools:
- CodeQL: Automated code security scanning (weekly)
- Dependabot: Automated dependency vulnerability detection
- npm audit: Regular dependency security audits
- TruffleHog: Secrets scanning in CI/CD
We strive to comply with:
- OWASP Top 10 security best practices
- CIS Docker Benchmark security recommendations
- Web3 security best practices
- Privacy-by-design principles
- PRIVACY.md - Privacy policy and data practices
- CONTRIBUTING.md - Contribution guidelines
- Documentation - General documentation
For general security questions or concerns that are not vulnerabilities, please open a GitHub Discussion or contact security@alternatefutures.com.
Last Updated: 2025-11-12