s3db.js 11.1.0 → 11.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/SECURITY.md +76 -0
- package/dist/s3db-cli.js +55029 -0
- package/dist/s3db.cjs.js +195 -7
- package/dist/s3db.cjs.js.map +1 -1
- package/dist/s3db.es.js +195 -7
- package/dist/s3db.es.js.map +1 -1
- package/package.json +2 -4
- package/src/plugins/eventual-consistency/analytics.js +164 -2
- package/src/plugins/eventual-consistency/config.js +4 -1
- package/src/plugins/eventual-consistency/consolidation.js +38 -4
- package/src/plugins/eventual-consistency/install.js +23 -1
- package/src/plugins/eventual-consistency/utils.js +64 -0
package/SECURITY.md
ADDED
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
# Security Policy
|
|
2
|
+
|
|
3
|
+
## Supported Versions
|
|
4
|
+
|
|
5
|
+
| Version | Supported |
|
|
6
|
+
| ------- | ------------------ |
|
|
7
|
+
| 11.x.x | :white_check_mark: |
|
|
8
|
+
| < 11.0 | :x: |
|
|
9
|
+
|
|
10
|
+
## Known Security Advisories
|
|
11
|
+
|
|
12
|
+
### Development Dependencies
|
|
13
|
+
|
|
14
|
+
The following vulnerabilities exist in **development-only** dependencies and **do not affect** the published npm package or runtime security:
|
|
15
|
+
|
|
16
|
+
#### pkg (GHSA-22r3-9w55-cj54) - MODERATE
|
|
17
|
+
- **Status**: Acknowledged, monitored
|
|
18
|
+
- **Impact**: Local privilege escalation
|
|
19
|
+
- **Scope**: Only affects developers running `pnpm run build:binaries`
|
|
20
|
+
- **Mitigation**: pkg is deprecated and archived. No patched version available (`<0.0.0`).
|
|
21
|
+
- **Risk Assessment**: LOW - Only used for creating standalone binaries during release process
|
|
22
|
+
- **Future Plans**: Migrate to Node.js Single Executable Applications (SEA) when stable
|
|
23
|
+
|
|
24
|
+
#### tar-fs - HIGH
|
|
25
|
+
- **Status**: RESOLVED in v11.1.1+
|
|
26
|
+
- **Fix**: Updated to patched version 2.1.4+
|
|
27
|
+
|
|
28
|
+
## Reporting a Vulnerability
|
|
29
|
+
|
|
30
|
+
If you discover a security vulnerability in the **runtime code** (not dev dependencies), please report it by:
|
|
31
|
+
|
|
32
|
+
1. **DO NOT** open a public issue
|
|
33
|
+
2. Email: [security contact - update this]
|
|
34
|
+
3. Include:
|
|
35
|
+
- Description of the vulnerability
|
|
36
|
+
- Steps to reproduce
|
|
37
|
+
- Potential impact
|
|
38
|
+
- Suggested fix (if any)
|
|
39
|
+
|
|
40
|
+
### Response Timeline
|
|
41
|
+
|
|
42
|
+
- **Initial Response**: Within 48 hours
|
|
43
|
+
- **Status Update**: Within 7 days
|
|
44
|
+
- **Fix Timeline**: Depends on severity
|
|
45
|
+
- Critical: 7 days
|
|
46
|
+
- High: 14 days
|
|
47
|
+
- Medium: 30 days
|
|
48
|
+
- Low: 60 days
|
|
49
|
+
|
|
50
|
+
## Security Best Practices
|
|
51
|
+
|
|
52
|
+
### For Users
|
|
53
|
+
|
|
54
|
+
1. **Always encrypt sensitive data**: Use `secret` field type for passwords, tokens, etc.
|
|
55
|
+
2. **Validate credentials**: Never commit AWS credentials to version control
|
|
56
|
+
3. **Use IAM policies**: Implement least-privilege access for S3 buckets
|
|
57
|
+
4. **Enable paranoid mode**: For production, use `paranoid: true` for soft deletes
|
|
58
|
+
5. **Audit hooks**: Review serialized functions before deploying to production
|
|
59
|
+
|
|
60
|
+
### For Contributors
|
|
61
|
+
|
|
62
|
+
1. **No secrets in tests**: Use environment variables or LocalStack
|
|
63
|
+
2. **Validate input**: All user input should be validated before S3 operations
|
|
64
|
+
3. **Handle errors safely**: Never expose AWS error details to end users
|
|
65
|
+
4. **Review dependencies**: Run `pnpm audit` before submitting PRs
|
|
66
|
+
5. **Test encryption**: Verify `secret` fields are actually encrypted in S3
|
|
67
|
+
|
|
68
|
+
## Audit Configuration
|
|
69
|
+
|
|
70
|
+
This project uses `audit-level=high` in `.npmrc` to focus on critical vulnerabilities affecting production. Moderate/low severity issues in dev-only dependencies are monitored but may not block releases if:
|
|
71
|
+
|
|
72
|
+
- They only affect development tools
|
|
73
|
+
- No patch is available
|
|
74
|
+
- The risk is assessed as acceptable
|
|
75
|
+
|
|
76
|
+
Current audit threshold: **HIGH** (ignores moderate/low in dev dependencies)
|