| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability in this project, please report it by creating a private security advisory on GitHub or by emailing the maintainers directly.
Please do not report security vulnerabilities through public GitHub issues.
- Never commit
.envfiles to the repository - Use
.env.exampleas a template for required environment variables - Rotate API keys regularly in production
- Use strong, randomly generated encryption keys (32+ characters)
- API key authentication required for user management mutations
- Input validation on all GraphQL endpoints
- Rate limiting should be implemented at the infrastructure level
- CORS configuration should be properly set for production domains
- Connection strings should never be exposed in code
- Use connection pooling to prevent connection exhaustion
- Regular database backups and security updates
- Principle of least privilege for database users
- Farcaster signer keys are encrypted using AES-256
- Environment-based encryption keys (never hardcoded)
- Secure random generation for API keys and secrets
- Enable HTTPS/TLS for all API endpoints
- Configure proper Content Security Policy (CSP) headers
- Implement request rate limiting and DDoS protection
- Monitor and log security-relevant events
- Keep dependencies updated and scan for vulnerabilities
- Regular security audits with
npm auditoryarn audit - Automated dependency updates via Dependabot
- Lock file verification to prevent supply chain attacks
- Identify and contain the security issue
- Assess the impact and affected users
- Apply necessary patches or mitigations
- Notify affected users if necessary
- Document the incident for future prevention
For any security questions or concerns, please reach out to the maintainers.