s3db.js 11.1.0 → 11.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/SECURITY.md ADDED
@@ -0,0 +1,76 @@
1
+ # Security Policy
2
+
3
+ ## Supported Versions
4
+
5
+ | Version | Supported |
6
+ | ------- | ------------------ |
7
+ | 11.x.x | :white_check_mark: |
8
+ | < 11.0 | :x: |
9
+
10
+ ## Known Security Advisories
11
+
12
+ ### Development Dependencies
13
+
14
+ The following vulnerabilities exist in **development-only** dependencies and **do not affect** the published npm package or runtime security:
15
+
16
+ #### pkg (GHSA-22r3-9w55-cj54) - MODERATE
17
+ - **Status**: Acknowledged, monitored
18
+ - **Impact**: Local privilege escalation
19
+ - **Scope**: Only affects developers running `pnpm run build:binaries`
20
+ - **Mitigation**: pkg is deprecated and archived. No patched version available (`<0.0.0`).
21
+ - **Risk Assessment**: LOW - Only used for creating standalone binaries during release process
22
+ - **Future Plans**: Migrate to Node.js Single Executable Applications (SEA) when stable
23
+
24
+ #### tar-fs - HIGH
25
+ - **Status**: RESOLVED in v11.1.1+
26
+ - **Fix**: Updated to patched version 2.1.4+
27
+
28
+ ## Reporting a Vulnerability
29
+
30
+ If you discover a security vulnerability in the **runtime code** (not dev dependencies), please report it by:
31
+
32
+ 1. **DO NOT** open a public issue
33
+ 2. Email: [security contact - update this]
34
+ 3. Include:
35
+ - Description of the vulnerability
36
+ - Steps to reproduce
37
+ - Potential impact
38
+ - Suggested fix (if any)
39
+
40
+ ### Response Timeline
41
+
42
+ - **Initial Response**: Within 48 hours
43
+ - **Status Update**: Within 7 days
44
+ - **Fix Timeline**: Depends on severity
45
+ - Critical: 7 days
46
+ - High: 14 days
47
+ - Medium: 30 days
48
+ - Low: 60 days
49
+
50
+ ## Security Best Practices
51
+
52
+ ### For Users
53
+
54
+ 1. **Always encrypt sensitive data**: Use `secret` field type for passwords, tokens, etc.
55
+ 2. **Validate credentials**: Never commit AWS credentials to version control
56
+ 3. **Use IAM policies**: Implement least-privilege access for S3 buckets
57
+ 4. **Enable paranoid mode**: For production, use `paranoid: true` for soft deletes
58
+ 5. **Audit hooks**: Review serialized functions before deploying to production
59
+
60
+ ### For Contributors
61
+
62
+ 1. **No secrets in tests**: Use environment variables or LocalStack
63
+ 2. **Validate input**: All user input should be validated before S3 operations
64
+ 3. **Handle errors safely**: Never expose AWS error details to end users
65
+ 4. **Review dependencies**: Run `pnpm audit` before submitting PRs
66
+ 5. **Test encryption**: Verify `secret` fields are actually encrypted in S3
67
+
68
+ ## Audit Configuration
69
+
70
+ This project uses `audit-level=high` in `.npmrc` to focus on critical vulnerabilities affecting production. Moderate/low severity issues in dev-only dependencies are monitored but may not block releases if:
71
+
72
+ - They only affect development tools
73
+ - No patch is available
74
+ - The risk is assessed as acceptable
75
+
76
+ Current audit threshold: **HIGH** (ignores moderate/low in dev dependencies)