| Version | Supported |
|---|---|
| 1.0.x | ✅ |
DO NOT open a public issue for security vulnerabilities.
Instead, please email: security@fileduck.example
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and provide a timeline for a fix.
FileDuck implements multiple security layers:
- Malware Scanning: ClamAV + VirusTotal
- Quarantine System: Files scanned before public access
- File Size Limits: 5 GB maximum
- MIME Type Validation: Prevent invalid file types
- One-Time Links: Atomic GET+DEL from Redis
- Signed URLs: CloudFront/S3 time-limited tokens (1 hour)
- SHA-256 Verification: Client-side integrity checks
- Expiration: TTL-based automatic deletion
- Rate Limiting: 10 requests/minute per IP
- CAPTCHA: After 3 failed attempts
- Entropy Enforcement: ≥40-bit share codes
- Audit Logging: Full request tracking
- HTTPS Only: All traffic encrypted
- Environment Variables: No secrets in code
- Principle of Least Privilege: IAM policies
- Network Isolation: Private subnets for scanner
- Client-Side Encryption: Optional zero-knowledge E2E
- No Metadata Collection: Minimal logging
- Auto-Deletion: Files expire and are purged
- Redis TTL: Metadata auto-expires
- Never commit secrets to Git
- Use
.env.localfor local development - Run
pnpm auditregularly - Keep dependencies updated
- Review pull requests for security issues
- Rotate credentials regularly
- Use separate AWS accounts for prod/staging
- Enable CloudTrail logging
- Set up SNS alerts for malware detections
- Monitor CloudWatch metrics
- Implement backup strategy
- Verify SHA-256 checksums after download
- Scan downloads with antivirus
- Use strong passwords for encryption
- Don't share codes publicly
- Report suspicious activity
- VirusTotal Free Tier: 4 requests/minute
- ClamAV Signatures: Update daily via cron
- Zero-Day Malware: May not be detected immediately
- Encrypted Files: Cannot be scanned for malware
Subscribe to security announcements:
- GitHub Security Advisories
- Email: security-updates@fileduck.example
- RSS: https://github.com/your-org/fileduck/security/advisories.atom
FileDuck is designed to help with:
- GDPR: Data minimization, right to deletion
- CCPA: Privacy by design
- SOC 2: Logging and monitoring
Note: Compliance depends on your deployment configuration.
We rely on:
- AWS S3 & CloudFront
- Upstash Redis
- Vercel Edge Functions
- ClamAV
- VirusTotal
Review their security policies independently.
In case of a security incident:
- Detection: Automated alerts via SNS
- Containment: Disable affected endpoints
- Investigation: Review logs and metrics
- Remediation: Deploy fixes
- Notification: Inform affected users
- Post-Mortem: Document and improve
Future enhancements:
- End-to-end encryption by default
- WebAuthn/FIDO2 for admin access
- Advanced threat detection (ML-based)
- Honeypot endpoints for threat intel
- Bug bounty program
Last updated: 2026-02-03