| Version | Supported |
|---|---|
| 1.x.x | ✅ |
If you discover a security vulnerability, please report it by emailing the maintainer directly rather than opening a public issue.
Please include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
You can expect an initial response within 48 hours.
Never commit secrets to the repository. Required secrets:
SECRET_KEY: Generate withpython -c "import secrets; print(secrets.token_urlsafe(32))"GITHUB_CLIENT_SECRET: From your GitHub OAuth App
- Set
ENVIRONMENT=productionto enable production-mode validations - Ensure
SECRET_KEYis a strong, unique value - Configure
ALLOWED_ORIGINSto only include your frontend domain - Use HTTPS for all traffic
- Replace in-memory session storage with Redis for multi-instance deployments
Session cookies are configured with:
httponly=True(prevents JavaScript access)secure=Truein production (HTTPS only)samesite=strict(CSRF protection)
Consider implementing rate limiting for production deployments to prevent brute force attacks.