| Version | Supported |
|---|---|
| 0.1.x | Yes |
As Cinephage is in active development, security updates are applied to the latest version. Users are encouraged to keep their installations up to date.
If you find a security issue, please report it responsibly.
- Do not open a public GitHub issue for security vulnerabilities
- Email security concerns to the project maintainers (create a private security advisory on GitHub)
- Use GitHub's private vulnerability reporting feature if available
When reporting a vulnerability, please include:
- A clear description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any suggested fixes (optional)
- Your contact information for follow-up questions
- Initial Response: Within 48 hours of receiving your report
- Status Update: Within 7 days with an assessment of the vulnerability
- Resolution: Depends on severity and complexity, but we aim to address critical issues within 14 days
- We will acknowledge receipt of your report
- We will investigate and validate the vulnerability
- We will work on a fix and coordinate disclosure timing with you
- We will credit you in the security advisory (unless you prefer to remain anonymous)
Cinephage is designed for use on trusted local networks. When exposing the application to external networks:
-
Use a Reverse Proxy
- Deploy nginx, Caddy, or Traefik in front of Cinephage
- Configure SSL/TLS with valid certificates
- Enable HTTPS-only access
-
Configure CSRF Protection
- Set the
ORIGINenvironment variable to your access URL - Example:
ORIGIN=https://cinephage.example.com
- Set the
-
Authentication
- Cinephage does not currently include built-in authentication
- Use reverse proxy authentication (basic auth, OAuth proxy, etc.)
- Consider VPN access for remote usage
-
Keep Updated
- Regularly update to the latest version
- Monitor the repository for security advisories
-
Environment Variables
- Never commit
.envfiles to version control - Use appropriate file permissions (600 or 640)
- Rotate credentials if compromised
- Never commit
-
API Keys
- Store API keys securely
- Use separate API keys for production and development
- Revoke unused or compromised keys immediately
-
File System
- Configure appropriate permissions on media directories
- Limit write access to necessary directories only
- Review root folder configurations periodically
-
qBittorrent
- Use strong passwords for WebUI access
- Enable HTTPS for qBittorrent WebUI if accessing remotely
- Consider binding to localhost and using a VPN
-
Torrent Traffic
- Use a VPN for torrent traffic where appropriate
- Configure your torrent client's privacy settings
Cinephage does not currently implement user authentication. Anyone with network access to the application can:
- View and modify library contents
- Trigger downloads
- Modify settings
Mitigation: Use reverse proxy authentication or restrict network access.
All API endpoints are accessible without authentication. This is by design for local network use but requires consideration for exposed installations.
Mitigation: Implement authentication at the reverse proxy level.
Credentials for private indexers are stored in the SQLite database. While the database is local, ensure:
- Appropriate file system permissions on
data/cinephage.db - Backups are stored securely
- Database is not exposed via web server misconfiguration
Log files may contain:
- Search queries
- Downloaded file names
- Error messages with paths
Mitigation: Review log retention policies and secure log directory access.
Security updates will be announced through:
- GitHub Security Advisories
- Release notes in CHANGELOG.md
- Repository releases
If you report responsibly:
- We'll work with you in good faith
- You'll get credit (unless you want to stay anonymous)
- No legal action against good-faith researchers
- We'll coordinate disclosure timing with you
For security issues, use GitHub's private vulnerability reporting.