| Version | Supported |
|---|---|
| 1.x.x | ✅ |
DO NOT open a public issue for security vulnerabilities.
Instead:
- Email: security@rpcforge.dev (or create one)
- Subject:
[SECURITY] Brief description - Include:
- Vulnerability description
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
Response Time:
- Initial response: Within 48 hours
- Fix timeline: Depends on severity
Severity Levels:
- Critical: Immediate action (RCE, auth bypass, data leak)
- High: Fix within 7 days
- Medium: Fix within 30 days
- Low: Fix in next release
When using RPCForge:
- Never commit
.envfiles - Use environment variables - Rotate API keys regularly - At least every 90 days
- Use HTTPS only - Never send API keys over HTTP
- Monitor admin endpoints - Restrict
/keys,/statsto trusted IPs - Keep dependencies updated - Run
npm auditregularly
- ✅ Rate limiting per API key
- ✅ Method blacklisting (blocks risky RPC methods)
- ✅ Request/response logging
- ✅ API key-based authentication
- ✅ Admin endpoint protection
Once a fix is released:
- We'll publish a security advisory
- Credit the reporter (if desired)
- Update CHANGELOG.md
Thank you for helping keep RPCForge secure! 🔒