We release patches for security vulnerabilities. The following versions are currently being supported with security updates:
| Version | Supported |
|---|---|
| 0.x.x | ✅ |
Note: As this project is in active development (pre-1.0 release), we currently only support the latest version. Once we reach v1.0.0, we will maintain security updates for the current major version.
We take the security of Mulligans Law seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via one of the following methods:
-
GitHub Security Advisories (Preferred)
- Navigate to the Security tab
- Click "Report a vulnerability"
- Provide a detailed description of the vulnerability
-
Email
- Send an email to: security@mulliganslaw.app (or your preferred security contact email)
- Use the subject line:
[SECURITY] Mulligans Law - Brief Description - Include detailed information about the vulnerability
Please include the following information in your vulnerability report:
- Type of vulnerability (e.g., SQL injection, XSS, authentication bypass, etc.)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability (what an attacker could achieve)
- Suggested fix (if you have one)
- Initial Response: You can expect an initial response within 48 hours acknowledging receipt of your report
- Status Updates: We will keep you informed of our progress every 5-7 business days
- Validation: We will work to validate the vulnerability and determine its impact
- Fix Development: If confirmed, we will develop and test a fix
- Disclosure: Once a fix is ready, we will:
- Release the security patch
- Update this SECURITY.md file
- Publish a security advisory (crediting you if desired)
- Notify users through release notes
- Coordinated Disclosure: We follow a coordinated disclosure approach
- Timeline: We aim to patch confirmed vulnerabilities within 90 days
- Public Disclosure: We will not publicly disclose the vulnerability until:
- A fix has been released
- Users have had reasonable time to update (typically 7-14 days)
- You agree (if you reported it)
The following are in scope for security vulnerability reports:
-
Authentication & Authorization
- User authentication bypass
- Privilege escalation
- Session management issues
- Token leakage or theft
-
Data Security
- Unauthorized access to user data
- Data leakage through APIs
- Insecure data storage
- SQL injection or database vulnerabilities
-
API Security
- API authentication bypass
- Rate limiting issues leading to DoS
- Input validation vulnerabilities
- Mass assignment vulnerabilities
-
Mobile App Security
- Local data storage vulnerabilities
- Insecure communication channels
- Certificate pinning bypass
- Code injection vulnerabilities
-
Infrastructure
- Cloud misconfigurations
- Exposed sensitive endpoints
- Insecure direct object references (IDOR)
The following are explicitly out of scope:
- Denial of Service (DoS) attacks requiring unrealistic resource consumption
- Social engineering attacks
- Physical attacks against the infrastructure
- Spam or abuse of contact forms
- Reports about software versions being out of date (without demonstrable vulnerability)
- Clickjacking on pages without sensitive actions
- Missing best practices without demonstrable security impact
- Theoretical vulnerabilities without proof of concept
- Third-party vulnerabilities (report these to the respective maintainers)
- Issues in dependencies already tracked in public vulnerability databases (we monitor these)
If you're contributing to Mulligans Law, please follow these security best practices:
- Never commit credentials, API keys, or secrets
- Use environment variables for sensitive configuration
- Implement proper role-based access control (RBAC)
- Always validate user permissions before sensitive operations
- Validate and sanitize all user inputs
- Use parameterized queries to prevent SQL injection
- Encrypt sensitive data at rest
- Use HTTPS/TLS for all data in transit
- Implement proper error handling (don't leak sensitive info in errors)
- Keep dependencies up to date
- Review security advisories for dependencies
- Use
flutter pub upgraderegularly - Run
flutter analyzebefore committing
- All code must be reviewed before merging
- Security-sensitive changes require extra scrutiny
- Use our CI/CD pipeline (all checks must pass)
- Follow the principle of least privilege
- Store sensitive data in secure storage (iOS Keychain, Android Keystore)
- Implement certificate pinning for API calls
- Obfuscate sensitive code in production builds
- Never log sensitive information in production
Mulligans Law implements the following security measures:
- Supabase Authentication: Industry-standard OAuth 2.0 and JWT tokens
- Row Level Security (RLS): Database-level authorization on all tables
- Encrypted Storage: Sensitive local data encrypted on device
- TLS/HTTPS: All network communication encrypted in transit
- Code Scanning: Automated CodeQL security analysis on every commit
- Dependency Scanning: Automated vulnerability scanning of dependencies
- Secure Defaults: Security best practices enabled by default
Security updates will be released as follows:
- Critical vulnerabilities: Immediate patch release (within 24-48 hours)
- High severity: Patch within 7 days
- Medium severity: Patch within 30 days
- Low severity: Included in next regular release
All security updates will be:
- Clearly marked in release notes with
[SECURITY]prefix - Published as GitHub Security Advisories
- Assigned CVE identifiers (if applicable)
- Communicated to users via app update notifications
No security advisories have been published yet.
Once published, they will be listed here with:
- CVE identifier
- Severity level
- Affected versions
- Fixed versions
- Description and impact
We believe in recognizing security researchers who help improve our security:
- Public Acknowledgment: With your permission, we will credit you in:
- The security advisory
- Release notes
- This SECURITY.md file (Hall of Fame section below)
- Hall of Fame: (to be created once we receive our first valid report)
- Supabase Security Best Practices
- Flutter Security Best Practices
- OWASP Mobile Security Project
- GitHub Security Best Practices
If you have questions about this security policy, please:
- Open a public GitHub issue (for non-sensitive questions)
- Email security@mulliganslaw.app (for sensitive questions)
Last Updated: 2025-10-20
Policy Version: 1.0