We take security seriously at FCS API. If you discover a security vulnerability, please report it responsibly.
- Do NOT open a public GitHub issue for security vulnerabilities
- Email us at: support@fcsapi.com
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Any suggested fixes (optional)
- Response Time: We aim to respond within 48 hours
- Updates: We will keep you informed of our progress
- Credit: We will credit you in our security acknowledgments (if desired)
| Version | Supported |
|---|---|
| Latest | ✅ |
| Older | ❌ |
We recommend always using the latest version of our libraries.
When using FCS API libraries:
- Never expose your API key in client-side code
- Use token-based authentication for frontend applications
- Set appropriate token expiry times (shorter is more secure)
- Store API keys securely using environment variables
- Keep libraries updated to the latest version
For client-side applications, use our secure token system:
- Generate tokens on your backend server
- Use
_public_key,_expiry, and_tokenparameters - See Token Generator Examples
- API Documentation
- Dashboard - Manage your API keys
Thank you for helping keep FCS API secure!