We release patches for security vulnerabilities in the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
| < 1.0 | ❌ |
We take the security of Miku seriously. If you discover a security vulnerability, please help us by disclosing it responsibly.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security vulnerabilities through one of the following methods:
-
GitHub Security Advisories (Preferred)
- Navigate to the Security tab
- Click "Report a vulnerability"
- Fill out the form with details
-
Email
- Send an email to the repository maintainer
- Include "SECURITY" in the subject line
- Provide detailed information about the vulnerability
When reporting a vulnerability, please include:
- Type of vulnerability (e.g., SQL injection, XSS, privilege escalation)
- Full paths of source file(s) related to the vulnerability
- Location of the affected source code (tag/branch/commit)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability
- Potential remediation suggestions (if any)
- Initial Response: Within 48 hours
- Progress Updates: Every 5-7 days until resolved
- Resolution Timeline: We aim to patch critical vulnerabilities within 7 days
- We'll work with you to understand and resolve the issue quickly
- We request that you do not publicly disclose the vulnerability until we've patched it
- Once fixed, we'll publicly acknowledge your contribution (unless you prefer to remain anonymous)
- We'll credit you in the security advisory (if desired)
NEVER share your Discord bot token publicly!
- Store your token in environment variables or a
.envfile - Add
.envto your.gitignorefile - Regenerate your token immediately if accidentally exposed
- Use a secrets manager for production deployments
# .env example (NEVER commit this file)
DISCORD_TOKEN=your_bot_token_hereEnsure proper file permissions on sensitive files:
chmod 600 .env
chmod 600 data/*.db- The SQLite database (
data/levels.db) contains user data - Keep regular backups of your database
- Restrict file access to the bot's user account only
- Never expose the database file publicly
Development:
- Use a separate test bot token for development
- Test in a private Discord server
- Don't use production data in development
Production:
- Run the bot with minimal privileges
- Use a dedicated user account (not root)
- Keep dependencies updated
- Monitor bot logs for suspicious activity
- Use a process manager (e.g., systemd, PM2)
The bot implements XP cooldowns (60 seconds) to prevent abuse. This is not a security feature but helps prevent spam.
Admin commands require Discord's Administrator permission. Ensure you properly configure role permissions in your server.
User data is stored locally in SQLite. Consider:
- Regular backups
- Encryption at rest for sensitive deployments
- Compliance with data protection regulations (GDPR, etc.)
We use several third-party libraries. Security vulnerabilities in dependencies are addressed as follows:
- Regular dependency updates
- Monitoring security advisories
- Automated dependency scanning (Dependabot)
Security patches are released as soon as possible after a vulnerability is confirmed. Update to the latest version to ensure you have all security fixes.
git fetch origin
git log HEAD..origin/main --onelinegit pull origin main
pip install -r requirements.txt --upgrade- Day 0: Vulnerability reported
- Day 1-2: Initial assessment and response
- Day 3-7: Develop and test fix
- Day 7-14: Release patch and security advisory
- Day 14+: Public disclosure (if applicable)
If you discover a security vulnerability in a dependency:
- Report it to the upstream project first
- Notify us so we can track and update when fixed
- We'll help coordinate fixes if needed
We currently do not offer a bug bounty program. However, we deeply appreciate security researchers' efforts and will publicly acknowledge your contribution.
We'd like to thank the following individuals for responsibly disclosing security vulnerabilities:
- No reports yet
If you have questions about this security policy, please open a discussion in GitHub Discussions or contact the maintainers.
Last Updated: March 6, 2026