Major refactoring to create a clean, integrated CLI application: ### New Features: - Unified CLI executable (./seo) with simple command structure - All commands accept optional CSV file arguments - Auto-detection of latest files when no arguments provided - Simplified output directory structure (output/ instead of output/reports/) - Cleaner export filename format (all_posts_YYYY-MM-DD.csv) ### Commands: - export: Export all posts from WordPress sites - analyze [csv]: Analyze posts with AI (optional CSV input) - recategorize [csv]: Recategorize posts with AI - seo_check: Check SEO quality - categories: Manage categories across sites - approve [files]: Review and approve recommendations - full_pipeline: Run complete workflow - analytics, gaps, opportunities, report, status ### Changes: - Moved all scripts to scripts/ directory - Created config.yaml for configuration - Updated all scripts to use output/ directory - Deprecated old seo-cli.py in favor of new ./seo - Added AGENTS.md and CHANGELOG.md documentation - Consolidated README.md with updated usage ### Technical: - Added PyYAML dependency - Removed hardcoded configuration values - All scripts now properly integrated - Better error handling and user feedback Co-authored-by: Qwen-Coder <qwen-coder@alibabacloud.com>
4.1 KiB
Security Policy
Supported Versions
We actively maintain and provide security updates for the following versions:
| Version | Supported |
|---|---|
| 1.0.6 | ✅ |
| 1.0.5 | ✅ |
| 1.0.0 | ✅ |
| < 1.0.0 | ❌ |
Reporting a Vulnerability
We take security vulnerabilities seriously. If you discover a security vulnerability in the Rank Math API Manager plugin, please follow these steps:
1. DO NOT create a public GitHub issue
Security vulnerabilities should be reported privately to prevent potential exploitation.
2. DO report via email
Send your security report to: security@devora.no
3. Include the following information in your report:
- Description: A clear description of the vulnerability
- Steps to reproduce: Detailed steps to reproduce the issue
- Impact: Potential impact of the vulnerability
- Environment: WordPress version, plugin version, and other relevant details
- Proof of concept: If possible, include a proof of concept (without exploiting it publicly)
4. What to expect:
- Response time: We aim to respond within 48 hours
- Assessment: We will assess the reported vulnerability
- Updates: We will keep you informed of our progress
- Fix timeline: Critical vulnerabilities will be addressed within 7 days
- Credit: We will credit you in our security advisories (unless you prefer to remain anonymous)
Security Best Practices
For Users:
- Keep WordPress updated: Always use the latest WordPress version
- Update plugins: Keep all plugins, including this one, updated
- Use strong authentication: Implement strong passwords and two-factor authentication
- Limit API access: Only grant API access to trusted applications
- Monitor logs: Regularly check WordPress and server logs for suspicious activity
- Use HTTPS: Always use HTTPS for API communications
For Developers:
- Input validation: Always validate and sanitize all input data
- Authentication: Implement proper authentication for all API endpoints
- Rate limiting: Consider implementing rate limiting for API endpoints
- Logging: Log security-relevant events
- Error handling: Don't expose sensitive information in error messages
Security Features
This plugin implements several security measures:
Authentication & Authorization:
- WordPress Application Password authentication
- User capability checks (
edit_posts) - Proper permission validation for all endpoints
Input Validation:
- All input parameters are sanitized
- URL validation for canonical URLs
- Text field sanitization using WordPress functions
- Post ID validation
Data Protection:
- No sensitive data is logged
- Secure transmission via HTTPS
- Proper WordPress nonce validation (where applicable)
Known Security Considerations
API Rate Limiting:
Currently, the plugin relies on WordPress's built-in rate limiting. For high-traffic sites, consider implementing additional rate limiting.
CORS:
The plugin uses WordPress's default CORS settings. For enhanced security, consider implementing custom CORS policies.
Logging:
The plugin doesn't log sensitive data, but ensure your WordPress installation has appropriate logging configured.
Security Updates
We regularly:
- Review and update dependencies
- Conduct security audits
- Monitor WordPress security advisories
- Test against common vulnerabilities
- Update security best practices
Responsible Disclosure
We follow responsible disclosure practices:
- We will not publicly disclose vulnerabilities until a fix is available
- We will work with security researchers to understand and fix issues
- We will credit security researchers in our advisories
- We will provide reasonable time for users to update before public disclosure
Contact Information
- Security Email: security@devora.no
- Company: Devora AS
- Website: https://devora.no
- GitHub: https://github.com/devora-as/rank-math-api-manager
Last Updated: July 2025