We actively support security updates for the latest version of Cursor Boston. Please ensure you're running the latest version to receive security patches.
| Version | Supported |
|---|---|
| Latest | ✅ |
| < Latest | ❌ |
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, please report them via email to: hello@cursorboston.com
When reporting a vulnerability, please include:
- Description - A clear description of the vulnerability
- Steps to Reproduce - Detailed steps to reproduce the issue
- Impact - Potential impact of the vulnerability
- Suggested Fix - If you have ideas for how to fix it (optional but appreciated)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution: Depends on severity and complexity
- We will acknowledge receipt of your report
- We will investigate and verify the vulnerability
- We will keep you updated on our progress
- We will credit you in the security advisory (if you wish)
- We will work to release a fix as soon as possible
- We will not disclose the vulnerability publicly until a fix is available
- We will coordinate with you on the disclosure timeline
- We will credit you in the security advisory (unless you prefer to remain anonymous)
If you're deploying Cursor Boston:
- Environment Variables - Never commit
.env.localfiles- Verify
.env.localis in.gitignore - Use
.env.local.exampleas a template - Set production environment variables in your deployment platform
- Verify
- Firebase Security Rules - Review and customize Firestore and Storage rules
- Deploy rules:
firebase deploy --only firestore:rules,storage:rules - Test rules thoroughly before production
- Review rules regularly for security gaps
- Deploy rules:
- Authentication - Use strong authentication methods
- Enable 2FA for admin accounts
- Use OAuth providers with proper redirect URIs
- Regularly review authorized domains in Firebase
- HTTPS - Always use HTTPS in production
- Ensure SSL certificates are valid and auto-renewing
- Use HSTS headers where possible
- Dependencies - Keep dependencies up to date:
npm audit- Run
npm auditregularly - Fix vulnerabilities promptly
- Consider using Dependabot for automated updates
- Run
- Secrets - Rotate API keys and secrets regularly
- Rotate OAuth client secrets periodically
- Use different secrets for development and production
- Never hardcode secrets in source code
- Rate Limiting - API routes are protected with rate limiting
- Review rate limit configurations for your use case
- Monitor for abuse patterns
- Input Validation - Validate all user inputs
- Sanitize user inputs to prevent XSS
- Validate file uploads (type, size)
- Use parameterized queries (Firestore handles this)
To prevent security issues:
- Always verify
.gitignoreincludes.env*files - Use
git statusbefore committing to ensure no sensitive files are staged - Consider using tools like git-secrets or truffleHog to scan for secrets
- Use pre-commit hooks to prevent committing secrets (see
.husky/pre-commit)
- Firebase API keys are public by design (they're client-side)
- Firestore Security Rules are the primary security mechanism
- Server-side secrets (Discord client secret) must remain private
- Email addresses in code are contact info, not secrets
Thank you for helping keep Cursor Boston secure!