Project URL: https://github.com/jedan-auth/jedan-auth
Security Portal: https://security.jedanauth.dev
Documentation: https://docs.jedanauth.dev/security
- Overview
- Reporting Security Vulnerabilities
- Security Response Timeline
- Security Practices
- Built-in Security Features
- Security Audits and Compliance
- Incident Response
- Responsible Disclosure Program
- Contact Information
Jedan-Auth is a modern authentication library built with security as a first-class principle. We follow industry best practices and maintain multiple layers of security controls to protect our users and their data.
- Defense in Depth: Multiple layers of security controls
- Zero Trust: Verify explicitly, never trust, always verify
- Privacy by Design: Data minimization and encryption by default
- Transparency: Open security practices and public disclosure
CRITICAL: Never disclose security vulnerabilities publicly until we've had a chance to address them.
-
Security Email:
security@jedanauth.dev- PGP Key Fingerprint:
4096R/0x7D8A1B2C3D4E5F6A 2026-01-15 - Download PGP Key
- PGP Key Fingerprint:
-
Security Advisory: https://github.com/jedan-auth/jedan-auth/security/advisories/new
-
Emergency Contact:
+251 (999) 036-945(Signal/Telegram only)
- Vulnerability Title: Brief descriptive title
- Severity Level: [Critical/High/Medium/Low]
- Affected Versions: Version ranges affected
- Description: Detailed vulnerability description
- Steps to Reproduce: Clear, reproducible steps
- Impact Analysis: Potential impact and risk assessment
- Suggested Fix: If you have a proposed solution
- Contact Information: Your preferred contact method
- Disclosure Preference: Public/Private disclosure preferenceWe follow a structured timeline for security vulnerability response:
| Severity | Initial Response | Patch Development | Public Disclosure | SLA Credit |
|---|---|---|---|---|
| Critical | β€ 2 business hours | β€ 24 hours | 30 days post-patch | 100% |
| High | β€ 4 business hours | β€ 72 hours | 45 days post-patch | 50% |
| Medium | β€ 24 hours | β€ 7 days | 60 days post-patch | 25% |
| Low | β€ 48 hours | β€ 14 days | 90 days post-patch | - |
- Initial Response: Acknowledgement and triage
- Patch Development: Fix development and testing
- Public Disclosure: Coordinated public disclosure
- SLA Credit: Service credit for enterprise customers
- Stay Updated: Always use the latest stable version
- Secure Configuration: Follow our security hardening guide
- Monitoring: Enable audit logging and security monitoring
- Access Control: Implement principle of least privilege
- Regular Audits: Conduct regular security assessments
- Security Reviews: All code changes require security review
- Automated Scanning: CI/CD includes multiple security scanners
- Dependency Management: Regular vulnerability scanning and updates
- Secret Management: Never store secrets in code or configuration files
- Security Training: Regular security awareness training
| Feature | Status | Description |
|---|---|---|
| Password Hashing | β Production Ready | Argon2id with memory-hard parameters |
| Rate Limiting | β Production Ready | Adaptive rate limiting with IP intelligence |
| SQL Injection Protection | β Production Ready | Parameterized queries and ORM protection |
| XSS Protection | β Production Ready | Context-aware output encoding |
| CSRF Protection | β Production Ready | Double-submit cookie pattern |
| Clickjacking Protection | β Production Ready | X-Frame-Options and CSP |
| Security Headers | β Production Ready | HSTS, CSP, X-Content-Type-Options |
| Brute Force Protection | β Production Ready | Progressive delays and account locking |
| Session Security | β Production Ready | Secure, HttpOnly, SameSite cookies |
| Feature | Status | Availability |
|---|---|---|
| Field-level Encryption | β GA | Enterprise Edition |
| Hardware Security Module | β GA | Enterprise Edition |
| Zero-Trust Architecture | β Beta | All Editions |
| ML-based Anomaly Detection | β Beta | Enterprise Edition |
| Automated Threat Intelligence | π§ Development | Q2 2024 |
| Quantum-Resistant Cryptography | π§ Research | Q4 2024 |
- Quarterly: Internal security audit and code review
- Bi-Annual: Third-party penetration testing
- Annual: Comprehensive security audit by certified firm
- Continuous: Automated security scanning and dependency monitoring
| Date | Auditor | Scope | Report |
|---|---|---|---|
| 2026-Q1 | Cure53 | Core Authentication | View |
| 2026-Q4 | NCC Group | Cryptography Review | View |
| 2026-Q3 | Bishop Fox | API Security | View |
| Standard | Status | Certificate |
|---|---|---|
| SOC 2 Type II | β Certified | Download |
| ISO 27001:2026 | β Certified | Download |
| GDPR | β Compliant | DPA Available |
| CCPA/CPRA | β Compliant | Compliance Guide |
| HIPAA | β Compliant | BAA Available |
| FedRAMP | π§ In Process | Targeted 2026-Q3 |
SEV-1: Critical Incident
Impact: System compromise, data breach, service outage
Response: Immediate, 24/7 security team activation
Resolution SLA: 4 hours
Communication: Hourly updates, public disclosure required
SEV-2: High Severity Incident
Impact: Security feature bypass, data exposure risk
Response: Within 2 hours during business hours
Resolution SLA: 24 hours
Communication: Daily updates, customers notified
SEV-3: Medium Severity Incident
Impact: Security misconfiguration, vulnerability
Response: Within 24 hours
Resolution SLA: 7 days
Communication: Weekly updates, advisory published
SEV-4: Low Severity Incident
Impact: Informational findings, best practices
Response: Within 48 hours
Resolution SLA: 30 days
Communication: Monthly security bulletin- Incident Commander: Ultimate decision authority
- Technical Lead: Technical analysis and remediation
- Communications Lead: Internal and external communications
- Legal/Compliance: Regulatory and legal requirements
- Customer Support: Customer communication and support
We offer financial rewards for valid security vulnerability reports through our bug bounty program.
| Severity | Base Bounty | Maximum Bounty | Examples |
|---|---|---|---|
| Critical | $5,000 | $15,000 | RCE, Auth Bypass, Data Leak |
| High | $2,000 | $5,000 | Privilege Escalation, CSRF |
| Medium | $500 | $2,000 | XSS, Information Disclosure |
| Low | $100 | $500 | Security Misconfigurations |
We recognize security researchers who responsibly disclose vulnerabilities:
| Researcher | Organization | Vulnerability | Date | Bounty |
|---|---|---|---|---|
| Alice Chen | Independent | JWT Validation Bypass | 2024-01-15 | $7,500 |
| Bob Zhang | SecurityCorp | Rate Limit Bypass | 2023-12-10 | $3,000 |
| Carol Wu | University Lab | Session Fixation | 2023-11-05 | $1,500 |
- Security Email:
security@jedanauth.dev(PGP encrypted) - Emergency Phone:
+251 (999) 036-945(Signal/Telegram only) - Security Portal: https://security.jedanauth.dev
- Security Twitter: @JedanAuthSec
- Privacy Officer:
privacy@jedanauth.dev - Legal Inquiries:
legal@jedanauth.dev - DPA Requests:
dpa@jedanauth.dev
| Version | Date | Changes |
|---|---|---|
| 4.0.0 | 2026-02-03 | Complete rewrite with modern security practices |
| 3.2.0 | 2026-12-15 | Added compliance certifications and bug bounty |
| 3.1.0 | 2026-10-01 | Enhanced incident response procedures |
| 3.0.0 | 2026-08-15 | Initial public release |
Last Updated: 2026-02-03
Policy Version: 4.0.0
Policy ID: SEC-POL-2026-002
Effective Date: 2026-02-03
Review Date: 2026-05-03
Β© 2026 Jedan-Auth. All rights reserved. This document is proprietary and confidential.