If you discover a security vulnerability in CrewDock, please report it responsibly:
- Do not open a public issue
- Email crewdock@proton.me with details
- Include steps to reproduce if possible
- Allow reasonable time for a fix before public disclosure
CrewDock runs as a Docker container with host networking and manages credentials for Discord, GitHub, Google Workspace, and X/Twitter APIs. Security-relevant areas include:
- Credential storage:
.envfile permissions and secrets handling - SQL injection: SQLite helpers in
forge-db.shandscouter-db.sh - Container security: Dockerfile, entrypoint, and volume mount configuration
- Input validation: Install wizard credential validation
.envfiles are created withchmod 600(owner-only read/write)- All SQL inputs are escaped via
esc()and validated viaassert_int() - The container runs as user
node, not root (root is used only for initial permission fixing) - Runtime data (
home/) is gitignored to prevent accidental credential commits