LynxPrompt takes security seriously. We handle user data, payment information, and authentication credentials, which requires a strong security posture.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please use GitHub's private vulnerability reporting:
- Go to https://github.com/GeiserX/LynxPrompt/security/advisories
- Click "Report a vulnerability"
- Fill out the form with details
We will respond within 48 hours and work with you to understand and address the issue.
- Type of issue (e.g., XSS, SQL injection, authentication bypass)
- Full paths of affected source files
- Step-by-step instructions to reproduce
- Proof-of-concept or exploit code (if possible)
- Impact assessment and potential attack scenarios
| Version | Supported |
|---|---|
| 0.x.x | ✅ Current release |
Only the latest version receives security updates. We recommend always running the latest version.
- NextAuth.js for authentication with multiple providers (GitHub, Google, Magic Link, Passkeys)
- Role-based access control (USER, ADMIN, SUPERADMIN)
- Session-based authentication with secure cookies
- CSRF protection via NextAuth.js built-in mechanisms
- Passkeys/WebAuthn for passwordless authentication
- Separate databases for different data types (app, users, blog, support)
- Encrypted connections (TLS) for all database connections in production
- No plaintext passwords - authentication via OAuth or magic links
- GDPR compliant - users can request data deletion
- Rate limiting via middleware (configurable per-endpoint)
- Input validation with Zod schemas
- IDOR prevention - ownership checks on all user resources
- No user enumeration - consistent responses for login/signup
- Self-hosted - no third-party cloud providers for core services
- Docker containers with non-root users and security options
- Reverse proxy (Caddy) with automatic HTTPS
- Cloudflare for DDoS protection and WAF
- GlitchTip (self-hosted, Sentry-compatible)
- Sensitive data filtering - headers, passwords, and PII are filtered before sending
- Never commit secrets - Use environment variables
- Validate all input - Use Zod schemas for API endpoints
- Check ownership - Always verify user owns the resource they're accessing
- Sanitize output - Prevent XSS in user-generated content
- Use parameterized queries - Prisma handles this automatically
- Use strong secrets - Generate with
openssl rand -base64 32 - Enable HTTPS - Use a reverse proxy with TLS
- Keep updated - Run the latest version
- Backup regularly - Especially the users database
- Monitor logs - Watch for suspicious activity
LynxPrompt is designed for GDPR compliance:
- Physical address disclosed in privacy policy
- Data processing based on contract and legitimate interest
- Users can request data export and deletion
- Cookieless analytics via self-hosted Umami
- AEPD (Spanish DPA) complaint rights mentioned
- 14-day withdrawal right (waived for digital content with consent)
- Clear pricing in EUR
- Spanish law applies (Courts of Cartagena)
Security-related changes are documented in releases and the main CHANGELOG.
- Rate limiting middleware implementation
- Sensitive data filtering in error tracking
- Cloudflare integration for edge security
- Turnstile integration for bot protection
For security questions that aren't vulnerabilities, contact: security@lynxprompt.com
Last updated: December 2025