Currently supported versions of the Coffee Mapper Android app for security updates:
| Version | Supported |
|---|---|
| 1.1.x | ✅ |
| 1.0.x | ❌ |
We take the security of Coffee Mapper Android app seriously. If you believe you have found a security vulnerability, please report it to us as described below.
- DO NOT create a public GitHub issue for the vulnerability.
- Email your findings to geospatialtech.production@gmail.com
- Include detailed steps to reproduce the issue
- Include any proof of concept code if applicable
- Type of issue (e.g., data exposure, authentication bypass, permission escalation, etc.)
- Device and Android version information
- App version and build type
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- You will receive acknowledgment of your report within 48 hours
- We will confirm the issue and determine its severity
- We will release a fix as soon as possible depending on complexity
- All network communication uses HTTPS/TLS
- Sensitive data is encrypted at rest using Android's security best practices
- Secure file storage using Android's app-specific storage
- Regular security audits are performed
- Access logs are maintained and monitored
- Firebase Authentication integration
- Role-based access control (RBAC)
- Secure password policies
- Regular session management
- Secure token storage
- Android security best practices implementation
- SafetyNet Attestation API integration
- App signing and verification
- Proguard code obfuscation
- Runtime security checks
- Secure data backup procedures
When contributing to Coffee Mapper Android, please ensure:
- All API keys and secrets are properly secured
- Input validation is implemented
- Proper permission handling is in place
- Authentication and authorization checks are implemented
- Proper error handling is implemented
- Logging does not expose sensitive information
- Dependencies are regularly updated
- Android security best practices are followed
- File system operations are secure
- Network calls are properly encrypted
For any security-related questions, please contact:
- Security Team: geospatialtech.production@gmail.com
- Developer: amrit.dash60@gmail.com