Skip to content

Security: yxx4c/prisma-extension-redis

SECURITY.md

Security Policy for prisma-extension-redis

Reporting a Vulnerability

If a security vulnerability is discovered in prisma-extension-redis, please report it responsibly. Your assistance in keeping this project secure is greatly appreciated.

To report a vulnerability, please follow these steps:

  1. Do not disclose the vulnerability publicly until it has been addressed.
  2. Email the maintainer at mail.yxx4c+security@gmail.com with the following information:
  • A description of the vulnerability
  • Steps to reproduce the issue
  • Any relevant code snippets or configurations

Reports will be acknowledged as soon as possible, typically within a few days, depending on the complexity of the issue.

Supported Versions

The latest version of prisma-extension-redis is currently supported. Users are encouraged to use the most recent version to benefit from any security updates.

Security Best Practices

To enhance the security of applications using prisma-extension-redis, consider the following best practices:

  1. Keep Dependencies Updated: Regularly check for updates to prisma-extension-redis and its dependencies.
  2. Use Environment Variables: Store sensitive information, such as Redis connection strings and credentials, in environment variables instead of hardcoding them in the application.
  3. Limit Redis Access: Configure the Redis instance to allow access only from trusted sources.
  4. Monitor Logs: Regularly review application logs for any unusual activity.

Additional Resources

  • OWASP Top Ten - A list of the top ten security risks for web applications.
  • Redis Security - Best practices for securing Redis instances.

Thank you for helping to keep prisma-extension-redis secure!

There aren’t any published security advisories