We actively support the following versions with security updates:
| Version | Supported | Notes |
|---|---|---|
| 5.6.x | ✅ | Current release, fully supported |
| 5.5.x | ✅ | Previous release, critical fixes only |
| 5.4.x | ❌ | Upgrade to 5.6.x recommended |
| < 5.4 | ❌ | No longer supported |
- Production Dependencies: 0 vulnerabilities
- Development Dependencies: 11 low/moderate vulnerabilities (non-critical)
- Last Security Audit: 2025-10-25
The following vulnerabilities were resolved in recent releases:
v5.5.0 (2025-10-24):
- CVE-2023-48618: katex XSS vulnerability (removed @tryfabric/martian)
- CVE-2024-28245: katex XSS vulnerability (removed @tryfabric/martian)
- CVE-2021-23906: yargs-parser prototype pollution
- CVE-2020-28469: glob-parent ReDoS vulnerability
v5.6.0 (2025-10-25):
- 14 development dependency vulnerabilities
- Zero critical or high-severity issues remaining in production
Development Dependencies (Non-Critical):
- 2 moderate severity vulnerabilities in oclif v2 dependencies
- 9 low severity vulnerabilities in test infrastructure
- Impact: Development environment only, no production runtime impact
- Status: Tracked for resolution in future oclif v4 migration
Please do not report security vulnerabilities through public GitHub issues.
-
Email: Send details to
jake@coastalprograms.com -
Include:
- Type of vulnerability
- Full paths of source files related to the vulnerability
- Location of affected code (tag/branch/commit)
- Step-by-step instructions to reproduce
- Proof-of-concept or exploit code (if possible)
- Impact of the vulnerability
- Suggested fix (if you have one)
-
Response Time:
- Initial response: Within 48 hours
- Status update: Within 7 days
- Resolution timeline: Depends on severity
- Acknowledgment: We'll confirm receipt of your report within 48 hours
- Investigation: We'll investigate and validate the vulnerability
- Updates: You'll receive updates on our progress every 7 days
- Resolution: We'll work on a fix and coordinate release timing
- Credit: You'll be credited in release notes (unless you prefer anonymity)
- We follow coordinated disclosure
- Please allow us reasonable time to address the issue before public disclosure
- We aim to release security fixes within 90 days of initial report
- Critical vulnerabilities may be expedited
NEVER commit your Notion token to version control!
# ❌ BAD - Don't do this
export NOTION_TOKEN=secret_abc123...
git add .env
git commit -m "Add config"
# ✅ GOOD - Use environment variables
export NOTION_TOKEN=secret_abc123... # In shell session only
# Or add to ~/.bashrc, ~/.zshrc (never commit)Best Practices:
- Use environment variables for tokens, never hardcode
- Add
.envto.gitignoreif using env files - Rotate tokens regularly (every 90 days recommended)
- Use minimal permissions - only grant integration access to needed databases
- Revoke unused tokens at https://www.notion.so/my-integrations
Follow the principle of least privilege:
# ✅ GOOD - Share only specific databases
1. Create integration at https://www.notion.so/my-integrations
2. Share ONLY the databases you need to access
3. Review permissions regularly
# ❌ BAD - Sharing entire workspace unnecessarily
Don't share your entire workspace if you only need a few databases-
Verify package integrity before installation:
npm install @coastal-programs/notion-cli --dry-run
-
Use specific versions in production:
{ "dependencies": { "@coastal-programs/notion-cli": "5.6.0" } } -
Review audit reports regularly:
npm audit
-
Keep updated to latest version:
npm update @coastal-programs/notion-cli
When using in CI/CD pipelines:
# ✅ GOOD - Use encrypted secrets
env:
NOTION_TOKEN: ${{ secrets.NOTION_TOKEN }}
# ❌ BAD - Never expose tokens in logs
- run: echo "Token: $NOTION_TOKEN" # DON'T DO THISBest Practices:
- Store tokens in encrypted CI/CD secrets
- Never print tokens in logs
- Use read-only tokens when possible
- Audit CI/CD logs for accidental token exposure
- Rotate tokens if exposed in logs
| Date | Tool | Critical | High | Moderate | Low | Notes |
|---|---|---|---|---|---|---|
| 2025-10-25 | npm audit | 0 | 0 | 2 | 9 | DevDeps only |
| 2025-10-24 | npm audit | 0 | 0 | 0 | 0 | All production vulns fixed |
| 2025-10-23 | npm audit | 1 | 3 | 18 | 4 | Pre-v5.5.0 baseline |
We continuously monitor for security vulnerabilities using:
- npm audit - Automated dependency scanning
- Dependabot - Automated dependency updates
- GitHub Security Advisories - CVE monitoring
- Manual code review - Security-focused code reviews
If you're contributing code:
- Never commit secrets - Use environment variables
- Validate all inputs - Sanitize user input
- Use parameterized queries - Prevent injection attacks
- Follow least privilege - Minimize API permissions
- Keep dependencies updated - Run
npm auditregularly - Write security tests - Test authentication, authorization, input validation
Security considerations for code reviewers:
- No hardcoded credentials or tokens
- Input validation for user-provided data
- Error messages don't leak sensitive information
- Dependencies are up to date
- No SQL/command injection vulnerabilities
- Proper authentication/authorization checks
- Sensitive data not logged
Example Timeline for Critical Vulnerability:
- Day 0: Vulnerability reported
- Day 1: Acknowledgment sent to reporter
- Day 2-7: Investigation and validation
- Day 8-14: Develop and test fix
- Day 15: Release security patch
- Day 16: Public disclosure (coordinated with reporter)
Example Timeline for Low/Moderate Vulnerability:
- Day 0: Vulnerability reported
- Day 1-2: Acknowledgment and initial assessment
- Day 3-30: Investigation and fix development
- Day 31-60: Testing and release preparation
- Day 61: Release with next scheduled version
- Day 62: Public disclosure
Security Issues: jake@coastalprograms.com
General Issues: https://github.com/Coastal-Programs/notion-cli/issues
Discussions: https://github.com/Coastal-Programs/notion-cli/discussions
Last Updated: 2025-10-25 Next Review: 2026-01-25