If you discover a security vulnerability in this project, please report it responsibly:
DO NOT open a public issue. Instead, please report security vulnerabilities to:
- Unity Security Team: security@unity3d.com
Please include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Any suggested fixes (optional)
We will acknowledge receipt of your vulnerability report and send you regular updates about our progress.
Never commit secrets, credentials, or sensitive information to this repository.
- Use environment variables for all sensitive configuration
- Store secrets in Unity Dashboard under
Administration -> Secrets - Use the provided
.env.templatefile as a guide for required environment variables - Ensure your
.gitignorefile includes patterns for environment files and credentials
- Never hardcode AWS access keys, API keys, or other provider credentials
- Use IAM roles and least-privilege principles when configuring access
- Rotate credentials regularly
- Follow each provider's security best practices:
- Keep dependencies up to date
- Review security advisories for the packages you use
- Use Dependabot or similar tools to monitor for vulnerable dependencies
Before making any commits:
- Run a secret scan to ensure no credentials are being committed
- Review all changes to ensure no sensitive data is included
- Validate that environment variables are properly referenced, not hardcoded
This project provides example integrations and is not officially supported. Security updates will be made on a best-effort basis.
This project is provided "as-is" without warranty. Users are responsible for:
- Securing their own deployments
- Managing their credentials and access controls
- Complying with all applicable security policies and regulations
- Following security best practices for their chosen hosting providers