If you discover a security vulnerability in TheCyberHub, please report it responsibly:
- Email: Send details to [email protected]
- Do NOT create a public GitHub issue
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Fix Timeline: Depends on severity
- Credit: We'll credit you in the security advisory (if desired)
- Never commit
.env.localor files containing secrets - Use
.env.examplefor documentation only - Store sensitive data in environment variables
- Use different credentials for dev/staging/production
- Rotate API keys regularly
- Use least-privilege access
- Never hardcode credentials in source code
- Use environment variables with
NEXT_PUBLIC_prefix only for non-sensitive data
- Validate all user inputs
- Sanitize data before rendering
- Use parameterized queries (prevent SQL injection)
- Implement proper authentication and authorization
- Follow OWASP Top 10 guidelines
The project uses AWS Lambda for certain security tools. Protect these endpoints:
-
API Gateway Configuration
- Enable API keys - Set rate limiting (100 req/min recommended) - Configure CORS (allow only your domain) - Enable AWS WAF - Set up CloudWatch alarms
-
Lambda Function Security
- Use environment variables for secrets
- Implement request validation
- Set appropriate IAM roles
- Enable CloudWatch logging
- Set reserved concurrency limits
-
Monitoring
- Monitor for unusual traffic patterns
- Set up billing alarms
- Track error rates
- Log all security events
The project uses several external APIs. Secure them properly:
| Service | Security Measures |
|---|---|
| ipapi.co | No key required, rate-limited by IP |
| API Ninjas | API key required, rotate regularly |
| SSL Labs | Free service, rate-limited |
| AWS Lambda | Use environment variables, enable auth |
- Use separate OAuth apps for dev/prod
- Restrict callback URLs
- Keep client secrets secure
- Rotate credentials periodically
- Use secure, httpOnly cookies
- Implement CSRF protection
- Set appropriate session timeouts
- Validate tokens on every request
Many tools run entirely in the browser (JWT Analyzer, Encoder/Decoder, etc.). These are safe as they don't send data to servers.
Tools that require backend processing (Subfinder, Header Analyzer, Subdomain Takeover) use AWS Lambda. Ensure these are properly secured.
Some tools use external APIs (IP Lookup, WHOIS, SSL Checker). Be aware of:
- Rate limits
- Data privacy
- API key exposure
- Service availability
- No secrets or API keys in code
-
.env.localnot committed - User inputs validated
- SQL queries parameterized
- XSS prevention implemented
- CSRF tokens used where needed
- Environment variables set in hosting platform
- Different credentials for production
- HTTPS enabled
- Security headers configured
- Rate limiting enabled
- Monitoring and alerts set up
- Backup and recovery plan in place
- Update dependencies monthly
- Review security advisories
- Rotate API keys quarterly
- Audit access logs
- Test backup restoration
- Review and update security policies
We use automated tools to scan for vulnerabilities:
- GitHub Dependabot
- npm audit
- Snyk (optional)
- Review dependency updates before merging
- Check for known vulnerabilities
- Verify package authenticity
- Use lock files (
package-lock.json)
# Check for vulnerabilities
npm audit
# Fix automatically (if possible)
npm audit fix
# Update specific package
npm update package-name
# Update all packages (carefully)
npm update-
Immediate Actions
- Contain the breach
- Assess the impact
- Notify affected users
- Document everything
-
Investigation
- Identify the vulnerability
- Determine scope of breach
- Review logs and access patterns
- Identify affected data
-
Remediation
- Fix the vulnerability
- Rotate all credentials
- Deploy security patches
- Update security measures
-
Post-Incident
- Conduct post-mortem
- Update security policies
- Improve monitoring
- Share lessons learned
- Follow GDPR guidelines (if applicable)
- Implement data minimization
- Provide data export/deletion
- Maintain audit logs
- Review all contributions
- Scan for malicious code
- Verify contributor identity
- Use signed commits (recommended)
- Security Issues: [email protected]
- General Questions: GitHub Discussions
- Community: Discord Server
Last Updated: January 2026
Thank you for helping keep TheCyberHub secure! 🔒