FastCRUD is currently in pre-1.0.0 development. During this phase, only the latest version receives security updates and patches.
Version | Supported |
---|---|
Latest Release | ✅ |
Older Versions | ❌ |
We strongly recommend always using the latest version of FastCRUD to ensure you have all security fixes and improvements.
We take the security of FastCRUD seriously. If you believe you have found a security vulnerability, please report it to us as described below.
-
Do Not disclose the vulnerability publicly until it has been addressed by our team
-
Submit the vulnerability report through one of these channels:
- Email: [email protected]
- GitHub Security Advisory: https://github.com/igorbenav/fastcrud/security/advisories/new
Please provide detailed information about the vulnerability, including:
- A clear description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if available)
- Your contact information for follow-up questions
- Initial Response: Within 48 hours
- Status Update: Within 1 week
- Fix Timeline: Based on severity
- Critical: Within 7 days
- High: Within 14 days
- Medium: Within 30 days
- Low: Within 60 days
- Acknowledgment: You will receive an acknowledgment of your report within 48 hours
- Investigation: Our team will investigate the issue and determine its impact
- Updates: You will receive updates on the status of your report
- Resolution: Once resolved, you will be notified of the fix
- Public Disclosure: Coordinated disclosure after the fix is released
FastCRUD provides direct database access functionality. When using FastCRUD, ensure:
- Proper input validation and sanitization
- Restricted database user permissions
- Use of prepared statements (handled by SQLAlchemy)
- Implementation of proper authentication and authorization
When exposing FastCRUD endpoints, implement:
- Authentication for all endpoints
- Proper authorization checks
- Rate limiting
- Input validation
- CORS policies
- Never expose sensitive data in error messages
- Implement proper logging practices
- Use HTTPS for all API communications
- Implement proper data encryption at rest
- Follow data protection regulations (GDPR, CCPA, etc.)
- Always use the latest supported version
- Implement proper authentication and authorization
- Use HTTPS for all API endpoints
- Regularly update dependencies
- Follow the principle of least privilege
- Implement proper error handling
- Use secure configuration management
- Regular security audits and testing
FastCRUD includes several security features:
- SQL Injection Prevention: Through SQLAlchemy's query parameterization
- Input Validation: Via Pydantic schemas
- Error Handling: Secure error responses
- Soft Delete Support: For data protection
While FastCRUD implements security best practices, it's crucial to properly secure your application as a whole. This includes:
- Proper authentication implementation
- Authorization controls
- Input validation
- Error handling
- Secure configuration
- Regular security updates
- Monitoring and logging
Stay informed about security updates:
- Watch the GitHub repository
- Follow our security announcements
- Subscribe to our security mailing list
- Monitor our release notes
This security policy is part of the FastCRUD project and is subject to the same license terms.