This policy covers the zenzic-doc documentation portal — the Docusaurus-based site hosted at zenzic.dev.
For vulnerabilities in the Zenzic engine (Python, Shield scanner, path-traversal protection), see the core security policy.
Please do not open a public GitHub issue for security vulnerabilities.
Report privately via:
- GitHub Security Advisories (preferred): github.com/PythonWoods/zenzic-doc/security/advisories
- Email:
dev@pythonwoods.dev— subject line:[SECURITY] zenzic-doc — <brief description>
Include a clear description of the vulnerability, steps to reproduce, potential impact, and a suggested fix if available.
We will acknowledge your report within 72 hours and aim to release a patch within 14 days of confirming the issue.
| Area | Description |
|---|---|
| npm dependency CVE | A known CVE in a runtime dependency (docusaurus, react, tailwindcss, etc.) that affects the built site or the build pipeline |
| Zenzic Sentinel bypass in docs | A crafted file in docs/ or blog/ that causes zenzic check all to pass despite containing a credential pattern (Z201) |
| Build pipeline code execution | A crafted MDX file, config, or plugin that causes arbitrary code execution during npm run build |
| Pre-commit hook bypass | Any method that allows a commit to bypass the Shield, TypeScript, or REUSE pre-commit hooks |
| Static asset exposure | A file committed to static/ that inadvertently exposes credentials or sensitive configuration |
Out-of-scope: content errors, broken links (reported as standard issues), cosmetic
rendering bugs, or issues that only affect local dev mode (npm run start).
npm dependencies are audited automatically:
npm-audit.ymlruns on every PR, push tomain, and weekly — flags high-severity CVEs.dependency-review.ymlflags risky dependency changes introduced by PRs.
To audit locally:
npm audit --audit-level=highThe documentation portal is a static site — no server-side code executes at runtime. The attack surface is limited to:
-
Build pipeline —
npm run buildexecutes Node.js. Crafted MDX could theoreticallyexploit a Docusaurus or remark plugin vulnerability. Keep dependencies up to date.
-
Pre-commit hooks — the Zenzic Sentinel scans all source files for credential patterns
before every commit. The Shield (exit code 2 on Z201) is the last line of defence before content reaches the public site.
-
Static assets — binary files committed to
static/bypass text-based scanning.The
check-added-large-fileshook limits accidental binary commits.
| Version | Support status |
|---|---|
0.7.x (current) |
✅ All security fixes |
0.6.x |
|
< 0.6 |
❌ End of life — no support |