We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
- Supabase Authentication for user management
- Secure session handling with JWT
- Email verification required
- Secure password policies
- OAuth provider integration
- Supabase PostgreSQL with RLS (Row Level Security)
- End-to-end data encryption
- Secure API endpoints with middleware
- Input sanitization and validation using Zod
- Real-time security policies
- Vercel deployment with security headers
- CORS policy implementation
- Rate limiting on API routes
- DDoS protection
- Edge functions security
- TypeScript strict mode enabled
- ESLint security rules
- Automated security scanning in CI/CD
- Regular dependency updates
- Playwright E2E testing
- Strict remote patterns for allowed domains
- Image optimization and sanitization
- Content security policy headers
- XSS prevention
- SQL injection protection
If you discover a security vulnerability within RateMyEmployer, please follow these steps:
- Do Not disclose the vulnerability publicly
- Send a detailed report to security@ratemyemployer.com
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment within 24 hours
- Regular updates on progress
- Credit for responsible disclosure
- Notification when the vulnerability is fixed
- Never commit sensitive information
- Use environment variables for secrets
- Follow the principle of least privilege
- Keep dependencies updated
- Write secure code following OWASP guidelines
- Use strong passwords
- Enable email verification
- Keep your access tokens secure
- Report suspicious activities
- Follow security guidelines in documentation
- GDPR compliance for EU users
- CCPA compliance for California residents
- Regular security audits
- Data protection impact assessments
For security-related inquiries, contact:
- Security Team: security@ratemyemployer.com
- Lead Security Engineer: security-lead@ratemyemployer.com
We use various tools to scan for security vulnerabilities:
- GitHub's Dependabot
- Snyk
- OWASP Dependency Check
- Regular manual audits
- Supabase security monitoring
-
Discovery & Alert
- Vulnerability identified
- Initial assessment made
- Key personnel notified
-
Assessment & Triage
- Impact evaluation
- Risk assessment
- Priority assignment
-
Response & Remediation
- Patch development
- Testing in staging
- Deployment to production
-
Disclosure
- User notification if required
- Public disclosure if necessary
- Documentation update
We maintain a private bug bounty program. For invitation:
- Demonstrate previous security research experience
- Contact security@ratemyemployer.com
- Sign our security researcher agreement