The following versions of Dynasty Defense System are currently supported with security updates:
Version | Supported |
---|---|
1.x | ✅ |
If you discover a security vulnerability, please report it responsibly. Do not publicly disclose the vulnerability until it has been addressed. To report an issue:
- Email: Reach out at [email protected] with details of the vulnerability.
- Include:
- A detailed description of the vulnerability
- Steps to reproduce the issue
- Any potential patches or recommendations
You will receive a response within 72 hours.
The following security measures have been implemented to protect Dynasty Defense System:
-
User Authentication:
- Enforced password complexity for all user accounts.
- Session tokens are used for authenticated interactions, minimizing unauthorized access.
-
Data Encryption:
- Passwords are hashed using bcrypt to ensure they are stored securely.
- Sensitive data transmitted over the network uses HTTPS to prevent interception.
-
Access Control:
- Role-based access control ensures that only admins have access to critical functions like user management and alarm silencing.
- Default admin credentials are encrypted and can be reset in the
config
file for extra security.
-
Error Handling:
- Sensitive error messages are not exposed to end-users, preventing potential attackers from gathering system details.
- All detected errors are logged for admin review and troubleshooting.
-
Security Audits:
- Regular security audits are conducted to identify and address vulnerabilities in the system.
- Documentation on fixes and improvements from these audits is available in the changelog.
For further information on best practices for securing similar applications:
Thank you for helping us keep Dynasty Defense System secure.