Skip to content

Security: iamaanahmad/gaza-aid-trust

Security

SECURITY.md

Security Policy

Supported Versions

We take security seriously and actively maintain security updates for the following versions:

Version Supported
1.0.x
< 1.0

Reporting a Vulnerability

If you discover a security vulnerability in Gaza Aid & Trust, please help us by reporting it responsibly.

How to Report

Please do NOT report security vulnerabilities through public GitHub issues.

Instead, please report security vulnerabilities by emailing:

What to Include

When reporting a vulnerability, please include:

  1. Description: A clear description of the vulnerability
  2. Steps to Reproduce: Detailed steps to reproduce the issue
  3. Impact: Potential impact and severity of the vulnerability
  4. Environment: Browser, OS, and any other relevant environment details
  5. Proof of Concept: If possible, include a proof of concept or exploit code
  6. Contact Information: How we can reach you for follow-up questions

Our Response Process

  1. Acknowledgment: We will acknowledge receipt of your report within 48 hours
  2. Investigation: We will investigate the report and determine its validity
  3. Updates: We will provide regular updates on our progress (at least weekly)
  4. Resolution: Once resolved, we will notify you and coordinate disclosure timing
  5. Credit: With your permission, we will acknowledge your contribution in our security advisory

Disclosure Policy

  • We follow responsible disclosure practices
  • We will work with you to determine an appropriate disclosure timeline
  • We aim to resolve critical vulnerabilities within 90 days
  • We will publish security advisories for confirmed vulnerabilities

Safe Harbor

We consider security research conducted in accordance with this policy to be authorized research. We will not pursue legal action against researchers who follow this policy.

Scope

This policy applies to:

  • The Gaza Aid & Trust web application
  • All official repositories under the Gaza Aid & Trust organization
  • Associated APIs and services

Out of Scope

This policy does not apply to:

  • Third-party services and dependencies (please report to the respective maintainers)
  • Social engineering attacks
  • Physical security issues
  • DDoS attacks
  • Spam or abuse of services

Security Best Practices

For Users

  • Keep your browser and operating system updated
  • Use strong, unique passwords
  • Enable two-factor authentication where available
  • Be cautious with sharing personal information
  • Report suspicious activity

For Contributors

  • Follow secure coding practices
  • Validate all inputs
  • Use parameterized queries for database operations
  • Implement proper authentication and authorization
  • Keep dependencies updated
  • Use environment variables for sensitive configuration

Contact

For security-related questions or concerns:

Thank you for helping keep Gaza Aid & Trust secure! 🛡️

There aren’t any published security advisories