The Better Auth Plugins team and community take the security of our project seriously. We appreciate the efforts of security researchers and believe that responsible disclosure of security vulnerabilities helps us ensure the security and privacy of all users.
We are committed to working with the community to verify, reproduce, and respond to legitimate reported vulnerabilities. Thank you for helping us maintain secure authentication and authorization plugins.
This security policy applies to vulnerabilities discovered within the better-auth-plugins repository itself. The scope includes:
- Plugin source code and configurations
- Build processes and package scripts
- Authentication and authorization plugin implementations
- Plugin APIs and client SDKs
- Database adapters and storage implementations
- Plugin security configurations and defaults
- Documentation and example code
The following are considered out of scope for this policy:
- Vulnerabilities in applications built using the plugins, unless the vulnerability is directly caused by a flaw in the plugin's code
- Vulnerabilities in third-party dependencies that have already been publicly disclosed (please use
bun auditor await Dependabot alerts) - Security issues resulting from user misconfiguration or failure to follow documented security best practices
- Issues that require physical access to the user's device or compromised development environment
- Vulnerabilities requiring a compromised CI/CD pipeline or build environment
- Social engineering attacks against project maintainers or users
- Issues in the core Better Auth library (please report to the main Better Auth repository)
We provide security updates for the most recent version of Better Auth Plugins available on the main branch. We strongly encourage all users to use the latest stable version of each plugin to benefit from the latest security patches and improvements.
| Version | Supported |
|---|---|
| main | ✅ |
| < main | ❌ |
Instead, please send a detailed report to: [email protected]
To help us triage and validate your report efficiently, please include:
- Title: A clear, descriptive summary of the vulnerability
- Description: A detailed explanation of the vulnerability and its potential impact
- Affected Component(s): Specific plugins, files, or features affected (e.g.,
plugins/storage/src/index.ts, authentication flows, plugin configurations) - Steps to Reproduce:
- Clear, numbered steps to reproduce the issue
- Include any necessary configuration or environment details
- Expected vs. actual behavior
- Proof of Concept (PoC): Working code, scripts, or screenshots demonstrating the vulnerability
- Impact Assessment: Your assessment of the severity and potential impact:
- Data exposure or leakage
- Authentication/authorization bypass
- Remote code execution
- Denial of service
- Cross-site scripting (XSS)
- Other security impacts
- Suggested Fix: If you have ideas for how to address the vulnerability
- References: Links to similar vulnerabilities or relevant documentation
- Your Contact Information: Name/alias for public credit and preferred contact method
Once we receive your security report, we will follow this process:
We will acknowledge receipt of your vulnerability report and provide you with a tracking reference.
Our team will:
- Validate the vulnerability
- Assess its impact and severity
- Determine affected components
- Provide you with an initial assessment and expected timeline
We will:
- Develop and test a fix for the vulnerability
- Prepare security patches for affected versions
- Request a CVE identifier from GitHub if appropriate
- Coordinate the release timeline with you
Once the patch is released:
- We will publish a security advisory on GitHub
- Full credit will be given to the reporter (unless you prefer to remain anonymous)
- The advisory will include:
- Description of the vulnerability
- Impact assessment
- Affected versions
- Patched versions
- Workarounds (if any)
- Credits and acknowledgments
- All security-related communications will be conducted via email
- We will keep you informed throughout the remediation process
- If our investigation determines that the issue is not a security vulnerability, we will explain our reasoning
- We ask that you keep the vulnerability confidential until we've had adequate time to address it
We consider security research conducted in good faith and in accordance with this policy to be:
- Authorized concerning any applicable anti-hacking laws and regulations
- Exempt from restrictions in our Terms of Service that would interfere with security research
- Lawful, helpful, and appreciated
We will not pursue or support legal action against researchers who:
- Make a good faith effort to follow this security policy
- Discover and report vulnerabilities responsibly
- Avoid privacy violations, destruction of data, or interruption of our services
- Do not exploit vulnerabilities beyond what is necessary to demonstrate them
If legal action is initiated by a third party against you for your security research, we will make it known that your actions were conducted in compliance with this policy.
We greatly value the contributions of security researchers. With your permission, we will:
- Publicly credit you in our security advisories
- Add your name to our security acknowledgments
- Provide a letter of appreciation upon request
While this policy covers vulnerabilities in the plugins themselves, we recommend all users follow these security best practices:
- Store plugin configurations securely and never commit sensitive data
- Use environment variables for secrets (API keys, encryption keys, database URLs)
- Configure plugins with proper security defaults
- Validate all plugin configuration options
- Use secure random values for tokens and secrets
- Enable plugin debug mode only in development environments
- Review plugin configurations before deployment
- Configure plugins with secure defaults
- Implement proper session management with session plugins
- Use strong encryption for sensitive data
- Enable rate limiting where appropriate
- Regularly update Better Auth and plugin dependencies
- Validate all user inputs and plugin configurations
- Regularly run
bun auditto check for vulnerable dependencies - Keep all dependencies up to date
- Review dependency licenses and security advisories
- Use HTTPS for all production deployments
- Configure plugins for production environments
- Enable appropriate security headers
- Monitor plugin performance and security
- Regular security audits of plugin configurations
- Use proper logging and monitoring for authentication events
- GitHub Security Advisories
- Better Auth Plugins Documentation
- OWASP Top 10
- OWASP Authentication Cheat Sheet
- Node.js Security Best Practices
Thank you for helping us keep Better Auth Plugins and its community safe!