If you discover a security vulnerability in this project, please email security@example.com instead of using the issue tracker. Please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work with you to resolve the issue.
- Change
SECRET_KEYin production - Use HTTPS for all connections
- Keep dependencies updated
- Store tokens securely (use httpOnly cookies in production)
- Use strong, unique passwords
- Enable CORS only for trusted origins
- Never commit
.envfiles or secrets - Use environment variables for sensitive data
- Validate and sanitize all inputs
- Use prepared statements (SQLModel handles this)
- Keep dependencies up to date
- Review code for XSS and CSRF vulnerabilities
- Use HTTPS in production
- Enable CORS headers carefully
- Bcrypt with 12 rounds is used for password hashing
- Passwords are limited to 72 bytes (bcrypt constraint)
- Always validate password strength
- Never log passwords
- Use secure password reset mechanisms
- Access tokens expire after 15 minutes
- Refresh tokens expire after 7 days
- Tokens are signed with
SECRET_KEY - In production, use httpOnly cookies
- Implement token blacklist for logout
None currently known. Please report any discovered vulnerabilities responsibly.
Security patches will be released as needed. Users should:
- Monitor this repository for updates
- Update dependencies regularly
- Test thoroughly before deploying updates
- Follow semantic versioning for updates