| Version | Supported |
|---|---|
| 1.0.x | ✅ Yes |
| < 1.0 | ❌ No |
If you discover a security vulnerability in ShopSync, please report it responsibly.
- Email: Send details to shyam21091996@gmail.com
- Subject:
[SECURITY] ShopSync - Brief description - Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
| Action | Timeline |
|---|---|
| Acknowledgment | Within 48 hours |
| Initial assessment | Within 1 week |
| Fix release | Within 2 weeks (critical) |
- We will acknowledge your report within 48 hours
- We will investigate and assess the severity
- We will develop and test a fix
- We will release a patch and credit you (unless you prefer anonymity)
When deploying ShopSync:
- Use strong, unique PostgreSQL passwords
- Keep Docker images updated to latest version
- Enable TLS/HTTPS via Ingress in Kubernetes
- Set
NODE_ENV=productionin production - Use Kubernetes secrets for sensitive configuration
- Restrict network access to PostgreSQL port
- Regularly rotate Shopify API tokens
- Enable Kubernetes RBAC and network policies
ShopSync includes these security measures:
- Helmet.js — HTTP security headers
- CORS — Configurable cross-origin policy
- Rate Limiting — 300 requests/minute per IP
- Non-root Container — Runs as UID 1000
- Read-only Shopify — Only reads data, never writes to Shopify
- Pod Security Context —
runAsNonRoot, dropped capabilities - No privilege escalation — Explicitly disabled