GrootMade

Security Best Practices

Keep your sites secure when using GrootMade

Security Best Practices

Follow these guidelines to maintain security while using GrootMade products.

API Key Security

Do's

  • ✅ Use separate API keys per site
  • ✅ Rotate keys periodically (every 90 days)
  • ✅ Revoke keys for decommissioned sites
  • ✅ Use environment variables for keys

Don'ts

  • ❌ Share API keys publicly
  • ❌ Commit keys to version control
  • ❌ Use the same key across all sites
  • ❌ Share keys with untrusted parties

Storing Keys Safely

// wp-config.php
define('GROOTMADE_API_KEY', getenv('GROOTMADE_API_KEY'));

Or use a secrets manager like:

  • AWS Secrets Manager
  • HashiCorp Vault
  • Environment variables

Update Security

Keep Auto-Updates Enabled

Auto-updates are your first line of defense:

  • Security patches applied immediately
  • Vulnerabilities fixed before exploitation
  • No manual intervention required

Review Major Updates

For major version changes:

  1. Test on staging first
  2. Review changelog for breaking changes
  3. Backup before updating
  4. Have rollback plan ready

Security Update Priority

PriorityResponse Time
CriticalImmediate
HighWithin 24 hours
MediumWithin 7 days
LowNext update cycle

Plugin Security

Our Security Measures

Every product in our library:

  • 🔍 Scanned for malware before publishing
  • 🔒 Checked for known vulnerabilities
  • ✅ Verified GPL licensing
  • 🔄 Re-scanned on updates

What We Check For

  • Backdoors and malicious code
  • Obfuscated code (red flag)
  • Known vulnerability patterns
  • Suspicious external connections

Your Responsibility

  • Keep all plugins updated
  • Remove unused plugins
  • Review plugin permissions
  • Monitor site behavior

WP Security

Essential Practices

Keep WP Core Updated

Enable automatic updates:

define('WP_AUTO_UPDATE_CORE', true);

Use Strong Passwords

  • Minimum 16 characters
  • Mix of letters, numbers, symbols
  • Unique per site
  • Use a password manager

Limit Login Attempts

Install a brute-force protection plugin:

  • Limit failed attempts
  • Add CAPTCHA
  • Use 2FA

Regular Backups

Backup before any major changes:

  • Daily automated backups
  • Store off-site
  • Test restoration

File Permissions

Recommended permissions:

ItemPermission
Directories755
Files644
wp-config.php440 or 400
.htaccess644

Security Headers

Add to your .htaccess or server config:

Header set X-Content-Type-Options "nosniff"
Header set X-Frame-Options "SAMEORIGIN"
Header set X-XSS-Protection "1; mode=block"
Header set Referrer-Policy "strict-origin-when-cross-origin"

Hosting Security

Choose Secure Hosting

Look for:

  • Free SSL certificates
  • Web Application Firewall (WAF)
  • Malware scanning
  • DDoS protection
  • Regular backups

Server Hardening

  • Disable directory browsing
  • Block PHP execution in uploads
  • Use SFTP, not FTP
  • Keep server software updated

Incident Response

If You Suspect a Breach

Isolate — Take the site offline if possible

Assess — Check access logs, modified files

Clean — Remove malicious code, update all credentials

Restore — Use clean backup if available

Harden — Implement additional security measures

Report — Notify affected parties if required

Reporting Security Issues

Found a vulnerability in GrootMade or our products?

Responsible Disclosure:

  • Email: [email protected]
  • PGP key available on request
  • We respond within 24 hours
  • No legal action for good-faith reports

Security Resources

  • Wordfence — Firewall and malware scanner
  • Sucuri — Website security platform
  • WPScan — Vulnerability database
  • VirusTotal — File scanning

Stay Informed

On this page