| Version | Supported |
|---|---|
| 1.x.x | ✅ |
We take the security of Firefoo Clone seriously. If you have discovered a security vulnerability, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities
- Email details to the project maintainers (or open a private security advisory on GitHub)
- Include as much information as possible:
- Type of vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 1 week
- Resolution: Depends on severity and complexity
- NEVER commit service account files to version control
- NEVER share service account files publicly
- Store service account files in a secure location on your system
- Consider using environment variables for automated deployments
- Regularly rotate service account keys
- Use the principle of least privilege - create service accounts with minimal required permissions
# Service account files
*-firebase-adminsdk-*.json
serviceAccount*.json
firebase-credentials.json
# Environment files
.env
.env.local
.env.*.local
# Build outputs
dist/
dist-electron/If using Google Sign-In:
- Keep
GOOGLE_CLIENT_IDandGOOGLE_CLIENT_SECRETsecure - Never commit these to version control
- Use environment variables or secure secret management
- Restrict OAuth consent screen to necessary scopes
- Review authorized redirect URIs regularly
- Sensitive Data: Be cautious when viewing/exporting collections containing sensitive user data
- Export Files: JSON exports may contain sensitive data - handle appropriately
- Clipboard: Be aware that copying data places it in your system clipboard
- Logs: The logs panel may display sensitive information during operations
- The application connects to Firebase/Google services over HTTPS
- Google OAuth uses localhost callback (port 8085) during sign-in
- No data is sent to third-party servers (except Firebase/Google APIs)
This application follows Electron security best practices:
contextIsolation: true- Renderer process is isolated from Node.jsnodeIntegration: false- No direct Node.js access in rendererpreload script- Controlled IPC bridge for specific operations- No
remotemodule usage
The application requires:
- File System Access: For reading service account JSON files and import/export
- Network Access: For connecting to Firebase services
- Clipboard Access: For copy functionality
The application stores the following in local storage:
- Theme preference
- Default settings (document limit, view type, font size)
- UI preferences
No credentials or sensitive data are stored in local storage.
Security patches will be released as soon as possible after a vulnerability is confirmed. Users should:
- Watch the repository for releases
- Update to the latest version promptly
- Review the changelog for security-related updates
This project depends on several npm packages. We recommend:
- Running
npm auditregularly to check for vulnerabilities - Keeping dependencies updated
- Reviewing dependency changes before updating
| Package | Purpose |
|---|---|
firebase-admin |
Firebase backend operations |
electron |
Desktop application framework |
react, react-dom |
UI framework |
@mui/material |
UI components |
node-fetch |
HTTP requests for OAuth |
Users are responsible for ensuring their use of this application complies with:
- Their organization's security policies
- Data protection regulations (GDPR, CCPA, etc.)
- Firebase Terms of Service
- Google Cloud Platform Terms of Service
This software is provided "as is" without warranty. The maintainers are not responsible for any data loss, security breaches, or other damages resulting from the use of this software.
Thank you for helping keep Firefoo Clone and its users safe!