| Version | Supported |
|---|---|
| 1.x.x | ✅ |
We take the security of OrbitView seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
Or you can contact the developer directly:
🌐 Website: spacegumus.com.tr
🐙 GitHub: OrbitVieW
Please include the following information in your report:
- Type of vulnerability (e.g., XSS, CSRF, data exposure)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution Target: Within 30 days (depending on complexity)
We consider security research conducted in accordance with this policy to be:
- Authorized in accordance with the Computer Fraud and Abuse Act (CFAA)
- Exempt from DMCA restrictions
- Lawful, helpful, and performed in good faith
We will not pursue civil action or initiate a complaint to law enforcement for accidental, good faith violations of this policy.
If you're using Space-Track.org credentials:
- Never commit credentials to version control
- Store credentials in environment variables
- Use
.env.localfor local development - Rotate credentials if exposed
If deploying OrbitView yourself:
- Always use HTTPS in production
- Keep dependencies updated
- Configure proper CORS headers
- Enable rate limiting for API routes
This security policy was last updated on 2025-12-20.