| Version | Supported |
|---|---|
| 0.1.x | ✅ |
Please do NOT report security vulnerabilities through public GitHub issues.
Instead, email security@getdtax.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 48 hours and aim to provide a fix within 7 days for critical issues.
The following components are in scope:
packages/tax-engine/— Core calculation enginepackages/cli/— CLI toolpackages/shared-types/— Type definitionsapps/api/— Backend API (authentication, encryption, data handling)apps/web/— Frontend (XSS, CSRF, authentication flows)- Docker configurations and deployment
- API key encryption at rest (AES-256-CBC)
- JWT-based stateless authentication
- Bcrypt password hashing (12 rounds)
- Rate limiting on authentication endpoints
- Input validation at API boundaries (Zod schemas)
- No sensitive data in logs or error responses
- Role-based access control (USER/ADMIN)
We follow responsible disclosure practices. If you report a vulnerability:
- We will not take legal action against you
- We will credit you in the fix (unless you prefer anonymity)
- We ask that you do not publicly disclose until a fix is available