Skip to content

Security: Lissy93/domain-locker

.github/SECURITY.md

Security Policy for Domain Locker

Important

Domain Locker (self-hosted) comes with no warranty. Use at your own risk. The security of your data is your responsibility.

Security Overview

Domain Locker is designed with security in mind, but no software is immune to vulnerabilities. This document outlines our security policy, including how we handle vulnerabilities, supported versions, and how to report security issues.

Managed Instance

For security policy for the managed instance (domain-locker.com), please refer to Legal → Security.

Self-Hosted Instance

For self-hosted users, it is your responsibility to ensure the security of your instance. Implementing proper access controls, regular updates and following security best practices is crucial.


Supported Versions

We only provide security updates for the latest major version of Domain Locker and its active minor releases. Users running older versions are strongly encouraged to upgrade.


Reporting Security Issues

If you discover a security vulnerability in the Domain Locker application, please report it to us immediately. We take security seriously and will work with you to resolve the issue promptly.

How to Report

Send an email to [email protected] with the subject line "Domain Locker Security Issue".

What to Include

  • A detailed description of the vulnerability.
  • Steps to reproduce the issue.
  • Any relevant screenshots or logs.
  • Your contact information (optional, but helpful for follow-up).

Response Time

We will acknowledge your report within 48 hours and aim to provide a fix or mitigation plan within 28 days, depending on the severity of the issue.

Disclosure Policy

Please do not publicly disclose the vulnerability until we have had a chance to address it. We will coordinate with you on the timeline for public disclosure once the issue is resolved.

Out of Scope Issues

  • Issues that are not related to the Domain Locker application itself (e.g., server configuration, third-party services).
  • Issues that require physical access to the server or user devices.
  • Issues that are already publicly known or documented.
  • Issues that are not reproducible or lack sufficient detail for investigation.
  • Issues solely due to known vulnerable third-party packages (such as npm dependencies), unless they lead to an actual exploit within Domain Locker.

There aren’t any published security advisories