Currently supported versions of SchedulePro with security updates:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
The security of SchedulePro is taken seriously. If you discover a security vulnerability, please follow these steps:
Please do not create a public GitHub issue for security vulnerabilities. This helps protect users while the issue is being resolved.
Report security vulnerabilities via email to:
- Email: montaquim.tbm@gmail.com
- Subject Line: [SECURITY] Brief description of the issue
Please provide as much information as possible:
- Type of vulnerability (e.g., XSS, SQL injection, authentication bypass)
- Affected component(s) (e.g., authentication system, task storage)
- Steps to reproduce the vulnerability
- Potential impact of the vulnerability
- Suggested fix (if you have one)
- Your contact information for follow-up questions
Example Report:
Subject: [SECURITY] XSS vulnerability in task description
Description:
The task description field does not properly sanitize HTML input,
allowing for potential XSS attacks.
Steps to Reproduce:
1. Create a new task
2. In the description field, enter: <script>alert('XSS')</script>
3. Save the task
4. View the task details
Impact:
An attacker could inject malicious scripts that execute when
other users view the task.
Affected Version: 1.0.0
Browser: Chrome 96
Suggested Fix:
Implement HTML sanitization using DOMPurify or similar library
before rendering task descriptions.
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 1-7 days
- High: 7-14 days
- Medium: 14-30 days
- Low: 30-90 days
- Security vulnerabilities will be disclosed publicly only after a fix is released
- Credit will be given to the reporter (unless they prefer to remain anonymous)
- A security advisory will be published on GitHub
- Use strong, unique passwords
- Enable two-factor authentication when available
- Don't share your account credentials
- Log out when using shared computers
- Regularly export your tasks as backup
- Be cautious about sensitive information in task descriptions
- Review Firebase security rules if self-hosting
- Keep your browser updated
- Use reputable browser extensions only
- Clear browser cache/cookies periodically
- Be cautious of phishing attempts
- Use HTTPS connections only
- Avoid using public Wi-Fi for sensitive tasks
- Consider using a VPN for additional security
-
Firebase Authentication
- Secure password hashing
- OAuth 2.0 for Google Sign-In
- Session management
- CSRF protection
-
Data Security
- Firestore security rules
- User data isolation
- Encrypted data transmission (HTTPS)
- No third-party data sharing
-
Input Validation
- Client-side validation
- XSS prevention measures
- SQL injection protection (via Firebase)
-
Privacy
- No tracking or analytics
- Minimal data collection
- User data deletion on account removal
- Local storage encryption (browser-dependent)
- Content Security Policy (CSP) headers
- Rate limiting for API calls
- Two-factor authentication (2FA)
- Session timeout configuration
- Audit logging for sensitive actions
- Data encryption at rest
- Regular security audits
- Penetration testing
- Data stored in browser's local storage is not encrypted
- Local storage can be accessed by browser extensions
- Clear local storage when using shared computers
- Firebase API keys are exposed in client-side code (this is normal)
- Security is enforced through Firebase Security Rules
- Ensure proper security rules are configured in Firebase Console
- Font Awesome (CDN)
- Chart.js (CDN)
- Firebase SDK (CDN)
All CDN resources use Subresource Integrity (SRI) where available.
- Users can export their data
- Users can delete their account and data
- Minimal data collection
- Clear privacy policy
- User data is retained as long as the account is active
- Deleted tasks are permanently removed after 30 days
- Archived tasks are retained indefinitely unless deleted
Security updates will be released as patch versions (e.g., 1.0.1) and will be clearly marked in the CHANGELOG.md.
- GitHub Security Advisories
- Release notes
- Email notification to registered users (if applicable)
For security-related questions that are not vulnerabilities, you can:
- Open a GitHub Discussion
- Email: montaquim.tbm@gmail.com
Security Contact: Taafeef Bin Montaquim
- Email: montaquim.tbm@gmail.com
- GitHub: @AverageTaaf
Last Updated: 2025-09-30