Ticketr is currently in pre-release (v0.x). Security updates are provided for the latest version only.
| Version | Supported |
|---|---|
| 0.x.x | ✅ |
| < 0.1.0 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue in Ticketr, please follow responsible disclosure practices:
DO NOT open a public GitHub issue for security vulnerabilities.
Instead, please email security reports to:
- Email: karolswdev@gmail.com
- Subject: [SECURITY] Ticketr - Brief Description
Please include the following information in your report:
- Description - A clear description of the vulnerability
- Impact - What an attacker could achieve by exploiting this
- Steps to Reproduce - Detailed steps to reproduce the issue
- Affected Versions - Which versions of Ticketr are affected
- Suggested Fix - If you have a recommendation (optional)
- Your Contact Info - So we can follow up with questions
- Acknowledgment: We will acknowledge receipt of your report within 48 hours
- Updates: We will provide regular updates on our progress
- Timeline: We aim to release a fix within 30 days for critical issues
- Credit: We will credit you in the security advisory (unless you prefer to remain anonymous)
- We request that you do not publicly disclose the vulnerability until we have released a fix
- We will coordinate with you on the disclosure timeline
- Once fixed, we will publish a security advisory crediting the reporter (if desired)
Ticketr requires JIRA API credentials to function. Please follow these best practices:
-
Never commit credentials to version control
- Use
.envfile (already in.gitignore) - Use environment variables in CI/CD
- Never hardcode tokens in configuration files
- Use
-
Rotate tokens regularly
- Generate new API tokens periodically
- Revoke old tokens after rotation
- Use different tokens for different environments
-
Minimum permissions
- Grant only the permissions needed for Ticketr to function
- Use project-specific tokens when possible
- Avoid using admin-level API tokens
-
Secure storage
- Protect
.envfile with appropriate file permissions (chmod 600 .env) - Use secrets management in CI/CD (GitHub Secrets, etc.)
- Never share tokens via unsecured channels
- Protect
Ticketr automatically logs operations to .ticketr/logs/. These logs:
- Automatically redact sensitive data (API keys, emails, passwords)
- Should be added to
.gitignore(already included) - May contain ticket content and metadata
- Are rotated automatically (last 10 files kept)
If sharing logs for debugging:
- Review logs before sharing to ensure no sensitive data is present
- Redact any additional sensitive information manually if needed
The .ticketr.state file tracks ticket hashes and should be:
- Added to
.gitignore(environment-specific) - Not shared between environments
- Treated as sensitive if it contains ticket identifiers
As a pre-1.0 project, Ticketr has the following known limitations:
- API Token Storage: Credentials stored in plaintext
.envfile (user's responsibility to secure) - Network Security: No built-in HTTPS certificate validation override protection
- Rate Limiting: No built-in protection against API rate limiting (relies on JIRA's limits)
We are actively working on improving security for the 1.0 release.
If you are contributing to Ticketr:
- Never commit test credentials or API tokens
- Use
.env.exampleas template, never commit actual.env - Review code for potential injection vulnerabilities
- Validate all user input appropriately
- Follow secure coding practices for Go
- Run
go vetandstaticcheckbefore submitting PRs
Last Updated: October 2025