| Version | Supported |
|---|---|
| 1.0.x | ✅ |
We take security seriously. If you discover a security vulnerability, please follow these steps:
Security vulnerabilities should not be disclosed publicly until a fix is available.
Use GitHub Security Advisories to report vulnerabilities privately:
- Go to https://github.com/Teyk0o/euvia-nodejs/security/advisories
- Click "New draft security advisory"
- Fill in the details:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity (critical issues prioritized)
- No PII: No personal identifiable information is collected
- Anonymous: All data is hashed and categorized
- Ephemeral: 5-minute TTL on all data
- No Tracking: No cookies, fingerprinting, or persistent identifiers
- Hashed URLs: Page paths are base64-encoded
- Categorized UA: User agents grouped into device categories
- Bucketed Screens: Screen sizes rounded to common resolutions
- No IP Storage: IP addresses never logged or stored
- Redis Auth: Use Redis password authentication in production
- CORS: Configure allowed origins explicitly
- TLS/SSL: Use WSS (WebSocket Secure) in production
- Rate Limiting: Implement reverse proxy rate limiting
- Input Validation: All inputs validated and sanitized
- Environment Variables: Never commit
.envfiles - Redis Security: Use strong passwords and network isolation
- HTTPS/WSS: Always use encrypted connections in production
- Firewall: Restrict Redis port access
- Updates: Keep dependencies up to date
- Use WSS (WebSocket Secure) protocol
- Configure CORS with specific origins (not
*) - Enable Redis authentication
- Use environment variables for secrets
- Set up firewall rules
- Enable TLS/SSL certificates
- Implement reverse proxy rate limiting
- Monitor logs for suspicious activity
- Regular dependency updates
- Backup Redis data (if needed)
Euvia is designed to be GDPR-compliant by default:
- Anonymization: Data is anonymous before storage
- Minimization: Only essential metrics collected
- Retention: Automatic 5-minute data expiration
- Transparency: No hidden tracking or data collection
- Control: Self-hosted, full data ownership
- WebSocket connections can be resource-intensive
- Implement connection limits and rate limiting at reverse proxy level
- Monitor concurrent connections
- Redis is unauthenticated by default
- Always enable authentication in production
- Use network isolation (internal network only)
- Implement rate limiting at nginx/reverse proxy level
- Use connection throttling
- Monitor unusual traffic patterns
Security updates will be published as patch releases with detailed changelogs.
Subscribe to:
- GitHub Security Advisories
- Release notifications
- npm security alerts