We actively support the latest version of Simple Timer Card with security updates:
| Version | Supported |
|---|---|
| 1.2.x | ✅ |
| 1.1.x | ❌ |
| < 1.1 | ❌ |
Simple Timer Card v1.2.0+ includes several security enhancements:
- All user-provided timer labels are automatically sanitized to prevent script injection
- HTML characters are escaped before rendering in the DOM
- Applies to all timer sources: custom timers, entity names, and parsed data
- Timer durations are limited to a maximum of 24 hours
- Timer labels are limited to 100 characters
- All numeric inputs are validated for type and range
- Invalid data structures are rejected and logged
- Audio file URLs are validated to only allow safe protocols (
https:,http:,file:) - Home Assistant local paths (
/local/,/hacsfiles/) are explicitly allowed - Malicious URLs are blocked and logged
- localStorage and MQTT data is validated before use
- Corrupted data is automatically cleaned and reset
- JSON parsing errors are handled gracefully
- Actions are throttled to prevent spam (1 second for timer actions, 500ms for creation)
- Helps prevent performance issues and accidental rapid-fire actions
For enhanced security, consider implementing these CSP directives in your Home Assistant setup:
Content-Security-Policy:
script-src 'self' 'unsafe-inline' https://unpkg.com/lit@3.1.0;
connect-src 'self';
media-src 'self' data: blob: https: http:;
style-src 'self' 'unsafe-inline';We take security issues seriously. If you discover a security vulnerability, please follow these steps:
- Private Disclosure: For security vulnerabilities, please do NOT create a public GitHub issue
- Email: Send reports to the repository owner through GitHub's private vulnerability reporting feature
- GitHub Security: Use GitHub's "Report a vulnerability" button in the Security tab
Please provide as much detail as possible:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact and attack scenarios
- Suggested fix (if available)
- Your contact information for follow-up
- Acknowledgment: We will acknowledge receipt within 48 hours
- Initial Assessment: We will provide an initial assessment within 5 business days
- Fix Development: We aim to develop and test fixes within 30 days for critical issues
- Public Disclosure: We will coordinate with you on appropriate disclosure timing
When using Simple Timer Card:
- Keep Updated: Always use the latest version for security patches
- Validate Audio URLs: Only use trusted sources for audio notifications
- Monitor Logs: Check Home Assistant logs for security warnings
- Review Configurations: Regularly audit your timer card configurations
- Backup Data: Keep backups of your timer configurations
- Audio files from external URLs could potentially contain malicious content
- MQTT data should come from trusted sources only
- Timer labels from external integrations should be treated as untrusted input
- JavaScript execution context shares the same origin as Home Assistant
For general security questions or to report issues privately, please use GitHub's security features or contact the maintainer through official channels.
We appreciate security researchers and users who help keep Simple Timer Card secure by responsibly reporting vulnerabilities.