DO NOT open a public issue for security vulnerabilities. This could expose the vulnerability to the public before a fix is available.
Instead, please email your report to: security@learnova.com
Include the following information:
- Description — Detailed description of the vulnerability
- Location — Affected file(s) and line numbers
- Reproduction Steps — How to reproduce the issue
- Impact — Potential security impact (e.g., data exposure, unauthorized access)
- Suggested Fix — If you have a proposed solution (optional)
- Initial Response: Within 48 hours
- Assessment: We will assess the severity and impact
- Fix Development: We will work on a fix (timeline depends on severity)
- Public Disclosure: After a fix is released and tested
| Version | Supported |
|---|---|
| 1.x | ✅ Yes |
- Keep your credentials secure (never commit
.env.local) - Use strong passwords for all accounts
- Enable two-factor authentication where available
- Report any suspicious activity immediately
- Review access logs regularly (for teachers/admins)
- Never commit secrets, API keys, or credentials
- Use
.env.exampletemplate for sensitive configuration - Run security checks before submitting PRs
- Follow OWASP Top 10 guidelines
- Validate all user input
- Use prepared statements for database queries
- Face recognition data is processed client-side and should comply with GDPR/privacy laws
- Student attendance data should be encrypted at rest and in transit
- All API endpoints should enforce role-based access control
- Database credentials should rotate periodically
We use automated tools to scan for vulnerabilities:
- Dependency scanning (npm/package vulnerabilities)
- SAST (Static Analysis Security Testing)
- Code review before merge
Learnova uses the following third-party services — ensure you understand their privacy and security policies:
- Firebase — Authentication, analytics
- MongoDB Atlas — Database
- Vercel Blob — File storage
- EmailJS — Email service
- Groq API — AI/ML services
Thank you for helping keep Learnova secure! 🔒