Ghost is committed to developing secure, reliable products utilising all modern security best practices and processes.
bcrypt
to ensure password integrity.
root
and automatically configures all server directory permissions correctly according to OWASP Standards.
yarn audit
to ensure their integrity.
security@ghost.org
. The Ghost Security Team communicates privately and works in a secured, isolated repository for tracking, testing, and resolving security-related issues.
https://mysite.com
and https://admin.mysite.com/ghost/
). This way browsers offer greater built-in protection because credentials cannot be read across domains. Even in this case it should be understood that you are giving invited users completely free reign in content creation so absolute security guarantees do not exist.
Anyone concerned about the security of their Ghost install should read our hardening guide.
We take any attack vector where an untrusted user is able to inject malicious content very seriously and welcome any and all reports.