| Version | Supported |
|---|---|
| 0.1.x | ✅ |
If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public GitHub issue
- Email security concerns to:
security@webglo.org - Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work with you to understand and address the issue.
- CodeQL Analysis: Automated security scanning on all PRs and weekly
- Dependency Scanning: Dependabot monitors for vulnerable dependencies
- Secret Scanning: TruffleHog checks for leaked credentials
- npm Audit: Security audit runs on every CI build
- Authentication: Supabase Auth with Row Level Security (RLS)
- API Protection: Admin endpoints require API key authentication
- Input Validation: All user inputs validated server-side
- Sandboxed Execution: Agent code runs in isolated environment
- Escrow Contract: Funds locked until winner selected
- Admin Controls: Multi-step payout process
- On-Chain Verification: All payouts verifiable on BaseScan
When submitting code:
- No hardcoded secrets or API keys
- Inputs are validated and sanitized
- Database queries use parameterized statements
- New API endpoints have proper authentication
- Sensitive operations have audit logging
- Rate Limiting: Not yet implemented (planned: Upstash Redis)
- Webhook Signatures: GitHub webhook verification in progress
- API Key Rotation: Manual process currently
| Date | Auditor | Scope | Status |
|---|---|---|---|
| 2026-02-06 | Internal | Full codebase | ✅ Passed |
Thank you for helping keep The Jam secure! 🔒