DO NOT open a public issue for security vulnerabilities.
- Email: Report security issues privately via GitHub security advisories
- Repository: https://github.com/cyserman/Prose_Truth_Repo
- Credential leakage in code or commit history
- Unsafe script operations
- Dependency vulnerabilities
- Data exposure risks
This repository contains legal case management tools and may contain sensitive:
- Timeline data
- Evidence indexes
- Court-ready documents
- Personal case information
- All case data is local-first (browser/filesystem)
- No data transmitted to external servers by default
.gitignoreconfigured to exclude sensitive files
- Never commit
.envfiles - Use
.env.localfor local API keys - Add
.env*to.gitignore - Use environment variables in CI/CD
- Review all commits before pushing
- Automated Scanning: CI runs
detect-secretson every PR - Baseline File:
.secrets.baselinetracks known false positives - Manual Scan: Run
detect-secrets scan --baseline .secrets.baseline
If secrets are found in code:
-
IMMEDIATE ACTIONS (within 1 hour):
- ⛔ STOP all CI/CD pipelines
- ⛔ BLOCK the PR/merge
- 🔄 ROTATE the secret immediately
- 📝 LOG the incident: "⚠ Secrets found — blocking merge"
-
Remediation (within 24 hours):
- Remove secret from code
- Remove secret from Git history:
# Using git-filter-repo (recommended) pip install git-filter-repo git filter-repo --path path/to/file --invert-paths # OR using BFG Repo-Cleaner # See: https://rtyley.github.io/bfg-repo-cleaner/
- Update
.secrets.baseline:detect-secrets scan --baseline .secrets.baseline git add .secrets.baseline git commit -m "security: update secrets baseline after rotation"
-
Documentation:
- Add remediation steps to PR description
- Update SECURITY.md with incident details
- Create security advisory in GitHub (if sensitive)
-
Coordination:
- Notify all team members
- Update all affected systems
- Document rotation in password manager
The .secrets.baseline file:
- Tracks known false positives
- Must be committed to repository
- Updated when new patterns are identified
- Reviewed regularly for accuracy
- Use GitHub Secrets for CI/CD
- Use
.env.localfor local development - Never hardcode credentials
- Rotate secrets quarterly
- Review
.secrets.baselinemonthly
restore_christine.shperforms system operations- Review script before execution
- Run in controlled environment only
- Backup data before restoration
| Version | Supported |
|---|---|
| main | ✅ |
- Script Privileges:
restore_christine.shusessudofor apt operations - API Keys: Gemini API key required for strategic analysis features
- Local Storage: Browser localStorage used for data persistence
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Based on severity
- Critical: 24-48 hours
- High: 7 days
- Medium: 30 days
- Low: Best effort