DigniFi handles sensitive Personally Identifiable Information (PII) for individuals in financial crisis. Security is mission-critical. This document outlines our security practices, how to report vulnerabilities, and guidelines for contributors.
| Version | Supported | Notes |
|---|---|---|
| 1.x.x | ✅ | Current MVP release |
| < 1.0 | ❌ | Development/testing only |
DO NOT open public GitHub issues for security vulnerabilities.
- Email: security@dignifi.org (or create GitHub private security advisory)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact (who is affected, what data is at risk)
- Affected versions
- Suggested fix (if you have one)
- Your contact information for follow-up
What to Expect:
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 5 business days
- Status Updates: Every 7 days until resolved
- Fix Timeline: Critical vulnerabilities within 30 days, others within 90 days
- Public Disclosure: After fix is deployed, or 90 days (whichever comes first)
- We follow coordinated disclosure (90-day embargo)
- We will credit researchers who report responsibly
- We may offer bounties once funded (currently bootstrapped)
Critical (P0) - Immediate Response Required:
- Unauthorized access to user PII
- Authentication bypass
- Remote code execution
- SQL injection or command injection
- Mass data exfiltration
High (P1) - Fix Within 7 Days:
- XSS vulnerabilities affecting PII
- Privilege escalation
- Insecure cryptographic storage
- Session fixation
Medium (P2) - Fix Within 30 Days:
- CSRF on sensitive endpoints
- Information disclosure (non-PII)
- Insecure dependencies with known exploits
- Denial of service vectors
Low (P3) - Fix Within 90 Days:
- Security headers missing
- Information leakage in errors
- Weak password policies
- Clickjacking vulnerabilities
Detailed security guidance is organized by topic:
- Data Protection & Encryption - PII handling, encryption, data retention
- Authentication & Authorization - JWT, permissions, rate limiting
- Input Validation - XSS, SQLi, CSRF prevention patterns
- Development Security - Code review checklist, testing, git security
- Deployment Security - Production checklist, infrastructure hardening
- Compliance - GLBA, CCPA, UPL, breach notification
Quick checklist for all contributions:
- No secrets in code (use environment variables)
- Input validation on all user inputs
- Parameterized queries (no string concatenation)
- Authentication checks on all endpoints
- Encrypted fields for PII (SSN, income, debts)
- Audit logging for sensitive actions
- Error handling doesn't leak system details
- Dependencies up to date with no known CVEs
Short-term (Next 3 Months):
- Implement MFA for user accounts
- Add account lockout after failed login attempts
- Externalize audit logs to secure storage
- Implement key rotation mechanism
- Add security headers (CSP, HSTS, etc.)
Medium-term (3-6 Months):
- SOC 2 Type II preparation
- Penetration testing
- SIEM integration
- Encrypted S3 storage for generated forms
- Automated security scanning in CI/CD
Long-term (6-12 Months):
- HSM for encryption keys
- Real-time anomaly detection
- Bug bounty program
- Third-party security audit annually
- ISO 27001 certification (if scaling)
We thank security researchers who have responsibly disclosed vulnerabilities:
- None yet - be the first!
Security Team: security@dignifi.org GitHub: Create a private security advisory
Project Maintainer: Courtney Richardson
Last Updated: March 2026 Next Review: June 2026 (quarterly review cycle)