We release patches for security vulnerabilities. Currently supported versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
We take security seriously. If you discover a security vulnerability, please follow these steps:
Please do not open a public GitHub issue for security vulnerabilities.
Email us at: security@yourdomain.com
Include the following in your report:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Fix Timeline: Depends on severity
- Critical: 1-7 days
- High: 7-14 days
- Medium: 14-30 days
- Low: 30-90 days
- We will acknowledge your report within 48 hours
- We will provide regular updates on the fix progress
- We will notify you when the vulnerability is fixed
- We will publicly disclose the vulnerability after a fix is released
- We will credit you for the discovery (if desired)
- Keep Dependencies Updated: Run
npm auditregularly - Use HTTPS: Always use HTTPS in production
- Secure MongoDB: Enable authentication and use strong passwords
- Environment Variables: Never commit
.envfiles - Rate Limiting: Configure appropriate rate limits
- Origin Whitelist: Only allow trusted domains in
ALLOWED_ORIGINS
- Input Validation: Always validate and sanitize user input
- Authentication: Use nonce-based authentication for sensitive operations
- Logging: Never log sensitive data (passwords, tokens, etc.)
- Error Messages: Don't expose internal details in error messages
- Dependencies: Only add necessary dependencies and keep them updated
The system requires authentication tokens for payment providers. These must be:
- Stored securely in environment variables
- Rotated regularly
- Never committed to version control
- Transmitted only over HTTPS
- Enable MongoDB authentication
- Use strong passwords
- Restrict network access
- Enable encryption at rest
- Use TLS/SSL for connections
- Sessions expire after 10 minutes
- Nonces are single-use only
- IP address and user agent tracking
- Automatic cleanup of expired sessions
This system handles financial transactions and must comply with:
- PCI DSS: If storing card data (not applicable for UPI-only)
- Data Protection Laws: GDPR, local data protection regulations
- Financial Regulations: RBI guidelines for payment systems (India)
- HTTPS enabled with valid certificate
- MongoDB authentication enabled
- Strong passwords for all services
- Environment variables properly configured
- CORS restricted to production domains
- Rate limiting configured
- Logging enabled and monitored
- Regular backups configured
- Firewall rules in place
- Dependencies updated
- Security headers configured (Helmet.js)
- Input validation on all endpoints
- Error handling doesn't expose internals
We regularly audit our dependencies for security vulnerabilities:
npm auditCritical and high-severity vulnerabilities are addressed immediately.
For security concerns: security@yourdomain.com
For general questions: support@yourdomain.com