If you discover a security vulnerability in this project, please report it by emailing the maintainers. Please do not disclose security vulnerabilities publicly until they have been addressed.
- API keys are encrypted using AES-256-GCM before storage
- The encryption key is hardcoded to ensure consistency across deployments
- Important: Users should always use strong, unique passwords for the admin interface
This project uses environment variables for configuration. Never commit files containing real credentials:
.env- Local environment configuration (gitignored)- Create your own
.envfromenv.example - All sensitive values should be set via environment variables
- Always use HTTPS in production
- Change default passwords immediately after deployment
- Restrict database file access (
data/proxy.db) - Review firewall rules and network policies
- API Keys: Never commit real API keys to version control
- Database: The SQLite database file is gitignored - ensure it has proper file permissions
- Logs: Log files are gitignored - review logs for sensitive data before sharing
- Updates: Keep dependencies updated to patch security vulnerabilities
Currently supported versions with security updates:
| Version | Supported |
|---|---|
| latest | ✅ |
- JWT-based authentication
- API key encryption at rest
- Request/response logging (be careful with sensitive data)
- CORS configuration
- Rate limiting (recommended to add)