If you discover a security vulnerability in Codify, please report it responsibly:
- Email: [email protected]
- GitHub Issues: Open a security issue
Please include:
- A detailed description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested mitigation (if any)
| Version | Supported |
|---|---|
main |
โ Yes |
| others | โ No |
- Uses JWT-based authentication
- Role-based access control:
Admin,Learner - OAuth integration via Google Sign-In
.envfiles must not be committed- Avoid hardcoding secrets (e.g.,
JWT_SECRET,EMAIL_PASS) - Use environment variables for:
- MongoDB URI
- Email credentials
- Google OAuth keys
- API tokens (YouTube, RapidAPI, GitHub)
- ๐ Rotate secrets periodically
- ๐งช Validate user input to prevent injection attacks
- ๐ก๏ธ Use HTTPS in production
- ๐ซ Restrict CORS in production (
CLIENT_CORS=*is unsafe) - ๐ง Use secure email transport (e.g., OAuth2 or App Passwords)
- Keep all dependencies up-to-date
- Run
npm auditregularly - Use ESLint and Prettier for code hygiene
- Never expose
.envfiles publicly - Use secure deployment platforms with access control
- Monitor logs for suspicious activity
Maintaining security is a shared responsibility. Letโs keep Codify safe for all learners! ๐