If you believe you have found a security vulnerability, please report it immediately:
-
Do not open a public GitHub issue for security-sensitive bugs.
-
Email the maintainers (or open a private security advisory on GitHub) with a description of the issue and steps to reproduce.
-
Allow a reasonable time for a fix before any public disclosure.
We appreciate your help in keeping Scrumboy safe for users.
This section summarizes how the application handles sensitive data. It is intended for users and contributors who want to understand our security posture.
User passwords are hashed with bcrypt before being written to the database.
- Only the hash is stored in the
users.password_hashcolumn. On login, the provided password is verified withbcrypt.CompareHashAndPassword; the plaintext password is never persisted or logged.
- Session tokens are generated with
crypto/randand sent to the client in a cookie. The raw token is never stored in the database. - Only a SHA-256 hash of the token is stored in
sessions.token_hash. Lookups and revocation use this hash, so a database leak does not expose valid session tokens.
- No plaintext passwords or session tokens are stored. Sensitive credentials are stored only in hashed form as described above.
- Backup/export features may include project and user data; they do not include password hashes or session token hashes in a form that would allow authentication. Handle exported data according to your own data policies.
- Use HTTPS in production. Session cookies should be set with appropriate flags (e.g.
Secure,SameSite) when the app is served over HTTPS. - Keep dependencies up to date and review release notes for security fixes.
Last updated: February 2026