We take security seriously and will address vulnerabilities promptly.
| Version | Supported |
|---|---|
| latest | ✅ |
If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public issue for security vulnerabilities.
- Email us at [INSERT SECURITY EMAIL] with the subject line
[Security] Vulnerability Report. - Include as much detail as possible: steps to reproduce, affected components, potential impact.
- We will acknowledge receipt within 48 hours and aim to resolve within 7 days.
- Cross-site scripting (XSS)
- Cross-site request forgery (CSRF)
- Insecure data storage (localStorage)
- Broken authentication/authorization
- Content injection via roadmap JSON files
- Supply chain attacks via CDN dependencies
- Information disclosure
- No server-side components — this is a static site (HTML/CSS/JS only)
- No user data collection — all data stored in browser localStorage
- No cookies or tracking — no analytics, no third-party cookies
- Content Security Policy — recommended for hosting (see below)
- No build tools or dependencies — no npm packages, no supply chain risk
- JSON validation — roadmap JSON files are validated on load
When deploying DevRoadmaps, we recommend:
# Content Security Policy headers
Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; font-src 'self' https://fonts.gstatic.com; connect-src 'self';
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
Referrer-Policy: strict-origin-when-cross-origin
Permissions-Policy: camera=(), microphone=(), geolocation=()Roadmap data contains links to external educational resources. We do not control the content of these external sites. Users should exercise caution when visiting external links.
- All user data (progress, bookmarks, ratings, tips) is stored in
localStorageon the user's device - No data is transmitted to any server
- Clearing browser data removes all user data
- We have no access to any user's learning data
We follow responsible disclosure practices. Security researchers who responsibly report vulnerabilities will be credited in our release notes.