The following table outlines the versions of the Wedding Invitation project that are currently receiving security updates.
Version | Supported |
---|---|
1.0.x | ✅ |
< 1.0 | ❌ |
To report a security vulnerability in the Wedding Invitation project, please follow these steps:
-
Email: Send an email to
pradhana.odhy@gmail.com
with the subject "Security Vulnerability Report for Wedding Invitation". -
Include the following information:
- A detailed description of the vulnerability.
- Steps to reproduce the issue, if possible.
- The affected components (e.g., front-end, back-end).
- Any potential security impact.
-
What to expect:
- Acknowledgment: We will acknowledge receipt of your report within 48 hours.
- Initial Response: You can expect a preliminary assessment within 5 business days.
- Progress Updates: If the vulnerability is accepted, we will provide weekly updates on our progress toward a fix.
- Resolution: Once resolved, we will issue a patch or update and notify you of the fix.
-
Confidentiality:
- We kindly request that you do not publicly disclose the vulnerability until a fix is available, to ensure the safety and security of our users.
Your effort to responsibly disclose vulnerabilities helps keep this project secure, and we greatly appreciate your assistance!
- Hugo, TailwindCSS, JavaScript: These are used to build and style the front end.
- Vercel: Hosts the front end and ensures secure deployment.
- Python: Utilized for generating static Hugo pages.
- Prisma, Supabase, TypeScript: Power the API for handling form submissions and storing user wishes.
Thank you for helping us maintain the security of the Wedding Invitation project!