Security

If you've found a security issue, please email [email protected] rather than filing a public report. I'll respond within 72 hours and credit you (with permission) once the issue is resolved.

In scope

  • Account takeover or authentication bypass.
  • Privilege escalation (a regular user gaining moderator/admin access).
  • Reading another user's private messages or unpublished content.
  • Leaked PII or session tokens.
  • SQL injection, stored XSS, CSRF on sensitive actions, or any vulnerability in the Supabase Row-Level Security policies.
  • Vote or cred manipulation that bypasses the per-user, one-vote-per-target enforcement.

Out of scope

  • Spam or low-effort content posted by ordinary users (use moderation, not security disclosure).
  • Self-XSS, clickjacking on pages without sensitive actions, or attacks requiring physical access to a victim's device.
  • Social engineering of users or staff.
  • Denial-of-service or volumetric attacks.

Please don't

  • Test against live user accounts other than your own.
  • Run automated scanners that generate significant traffic.
  • Publish details of an unfixed vulnerability before we've had a chance to patch it.

No bounty program at this stage. We're a small project and appreciate responsible disclosure regardless.