The following versions of scorm-again are currently being supported with security updates:
| Version | Supported |
|---|---|
| 3.x.x | ✅ |
| 2.6.x | ✅ |
| < 2.6.0 | ❌ |
We take the security of scorm-again seriously. If you believe you've found a security vulnerability, please follow these steps:
- Do not disclose the vulnerability publicly - Please do not create a public GitHub issue for security vulnerabilities.
- Email the maintainer directly - Send details of the vulnerability to scorm-again@putney.io.
- Include details - Please provide as much information as possible, including:
- A description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
Here's what you can expect after reporting a vulnerability:
- Acknowledgment - You will receive an acknowledgment of your report within 48 hours.
- Verification - We will verify the vulnerability and determine its impact.
- Fix Development - If the vulnerability is accepted, we will develop a fix.
- Release Planning - We will determine an appropriate release schedule based on severity.
- Public Disclosure - Once a fix is released, the vulnerability will be publicly disclosed in the release notes.
- Security vulnerabilities will be disclosed after a fix has been released
- Credit will be given to the reporter (unless anonymity is requested)
- Public disclosure will include details about the vulnerability, its impact, and how to update
When implementing scorm-again in your projects, please follow these security best practices:
- Always validate data coming from external sources before passing it to the API
- Be cautious with the content of
suspend_dataas it may contain sensitive information - Use HTTPS for all LMS communications to prevent data interception
- Review the
xhrHeadersandresponseHandlersettings for potential security implications - Load SCORM content in a sandboxed iframe for security reasons
We would like to thank the following individuals for responsibly disclosing security vulnerabilities:
No security vulnerabilities have been reported yet.