linear-and-github-extension

Security Policy

Our Commitment

The security of Linear And GitHub Extension (LAGE) and our users is of utmost importance. We take all security vulnerabilities seriously and are committed to addressing them promptly and transparently.

Any security vulnerability discovered will be fixed as soon as possible with minimal impact when reported responsibly.

Supported Versions

We actively maintain and provide security updates for the following versions:

Version Supported Status
0.0.4 :white_check_mark: Latest
< 0.0.4 :x: Deprecated

Important: Please ensure you are always running the latest version available.

Some web browser extension stores may have an older version currently published. We recommend checking GitHub Releases for the most up-to-date version.

Security Features

LAGE implements the following security measures:

1. API Key Security

2. Minimal Permissions

3. No Data Collection

4. Content Security Policy

Reporting a Security Vulnerability

We appreciate responsible disclosure of security vulnerabilities. If you discover a security issue, please follow these guidelines:

🚨 How to Report

DO NOT open a public GitHub issue for security vulnerabilities.

Instead, please report security issues using one of the following methods:

  1. Preferred Method: Open a GitHub Security Advisory

    • This allows for private discussion before public disclosure
    • GitHub will assist in coordinating the fix and disclosure
  2. Alternative Method: Email the maintainer directly

    • Send details to: [security contact - to be added by maintainer]
    • Use PGP encryption if possible (public key available upon request)
  3. GitHub Issues (for non-critical issues only)

    • For minor security concerns that don’t involve active exploits
    • Label the issue with “security” tag

📝 What to Include in Your Report

Please provide as much information as possible:

📋 Example Report Template

## Vulnerability Summary

Brief description of the vulnerability

## Severity

Critical / High / Medium / Low

## Affected Components

- Component 1
- Component 2

## Steps to Reproduce

1. Step 1
2. Step 2
3. Step 3

## Impact

Description of what an attacker could do

## Suggested Fix

Optional: Your recommendations

## Disclosure Preference

When you'd like this to be disclosed publicly

Our Response Process

When you report a vulnerability:

  1. Acknowledgment (Within 48 hours)

    • We’ll confirm receipt of your report
    • Assign a tracking identifier
  2. Assessment (Within 7 days)

    • Evaluate severity and impact
    • Determine affected versions
    • Plan remediation timeline
  3. Development (Varies by severity)

    • Critical: Immediate fix (1-3 days)
    • High: Fast-track fix (3-7 days)
    • Medium: Scheduled fix (7-14 days)
    • Low: Standard development cycle
  4. Testing & Release

    • Thorough testing of the fix
    • Release patched version
    • Update documentation
  5. Disclosure (After fix is released)

    • Coordinate public disclosure with reporter
    • Publish security advisory
    • Credit reporter (if desired)

Security Best Practices for Users

To maximize your security while using LAGE:

✅ Do’s

❌ Don’ts

API Key Security

Your Linear API key is sensitive. Here’s how LAGE protects it:

How Keys Are Stored

Revoking a Compromised Key

If you believe your API key has been compromised:

  1. Immediately revoke the key in Linear Settings
  2. Generate a new API key
  3. Update the key in LAGE settings
  4. Monitor your Linear account for suspicious activity
  5. Report the incident to us if you believe it’s related to LAGE

Security Updates

Security updates are published through:

Scope

This security policy applies to:

This security policy does NOT apply to:

Bug Bounty Program

We currently do not offer a bug bounty program. However, we deeply appreciate security researchers’ contributions and will:

Security Hall of Fame

We honor security researchers who responsibly disclose vulnerabilities:

No security issues have been reported yet. Be the first to help us improve!

Contact

For security-related inquiries:

Additional Resources

This security policy is provided in good faith and does not constitute a legal contract. We reserve the right to modify this policy at any time.


Last Updated: December 2025
Version: 1.1